New Phishing Attack Via Facebook Messenger: Dangerous Attachments and The Stealer

New Phishing Attack Via Facebook Messenger

In an alarming development, a new phishing attack is surfacing via Facebook Messenger. This attack utilizes messages with malicious attachments originating from a swarm of fake and hijacked personal accounts. The ultimate goal of these attacks is to take over the targets’ accounts. This campaign is yet another one linked to a Vietnamese-based group. Learn more about phishing attacks here.

Dangerous Attachments and The Stealer

The campaign is uniquely characterized by its use of a tiny compressed file attachment. This attachment, however, is not as innocent as it seems. It contains a powerful Python-based stealer. This stealer is dropped in a multi-stage process designed to take over the targets’ accounts. For Cyber Security Professionals, understanding and combating these stealthy attachments is critical.

Understanding The Multi-Stage Process

  • Stage one involves sending the initial message with the malicious attachment.
  • The second stage involves the Python-based stealer being dropped into the targeted system.
  • The third and final stage is the takeover of the targets’ accounts.

These stages demonstrate the sophistication and complexity of the phishing campaign. Learn more about Cyber Incident Response here.

FAQ’s

Question Answer
What is the new phishing attack about? The new phishing attack uses Facebook Messenger to send messages with malicious attachments from fake and hijacked personal accounts.
How does the attack work? The attack uses a multi-stage process involving a Python-based stealer dropped into the targeted system.

Conclusion

In conclusion, this new phishing attack is a potent reminder of the ever-evolving and complex nature of cyber threats. It underscores the importance of maintaining robust and proactive cyber defenses and being cyber aware, particularly for large organisations and the public sector who often become the primary targets for such attacks.


Posted

in

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *