S1deload Stealer: The New Malware Threat Targeting Social Media Accounts

by | Feb 23, 2023 | News

Premium Content

Patreon

Subscribe to Patreon to watch this episode.

Reading Time: 3 Minutes

Bitdefender Discovers New Malware Targeting YouTube and Facebook Users

Security researchers with Bitdefender’s Advanced Threat Control (ATC) team have identified a new malware campaign that is targeting YouTube and Facebook users. Dubbed S1deload Stealer, the malware infects victims’ computers by tricking them into downloading executable files from adult-themed archives on social media platforms. Once installed, the malware can be controlled remotely to perform a variety of malicious tasks, including stealing saved credentials and cookies from the victim’s browser, mining for cryptocurrency, and artificially boosting view counts on YouTube and Facebook.

The Stealthy Nature of S1deload Stealer

The name S1deload Stealer is derived from the malware’s extensive use of DLL sideloading, which allows it to evade detection by security software. According to Bitdefender researcher Dávid Ács, the company’s products detected more than 600 unique users infected with the malware between July and December 2022. Victims are lured into downloading the malware through social engineering techniques and comments on Facebook pages that push adult-themed archives. If the user downloads one of these archives, they will instead receive an executable file containing the malware.

S1deload Stealer lureS1deload Stealer lure archive contents (Bitdefender)

See Also: So you want to be a hacker?
Offensive Security, Bug Bounty Courses

The Malware’s Capabilities

Once installed on a victim’s device, S1deload Stealer can be instructed by its operators to perform a range of tasks, including downloading and running additional components, deploying a stealer that exfiltrates saved credentials and cookies, or deploying a cryptojacker to mine BEAM cryptocurrency. If the malware manages to steal a Facebook account, it will attempt to estimate the account’s value by leveraging the Facebook Graph API. The malware author can then use the stolen credentials to spam on social media and infect more machines.

 

S1deload Stealer's Facebook propagationS1deload Stealer’s Facebook propagation (Bitdefender)

 

Protecting Yourself from S1deload Stealer

To avoid becoming a victim of S1deload Stealer, it is crucial never to run executables from unknown sources and keep anti-malware software up to date. Indicators of compromise (IOCs) and YARA rules linked to this malware campaign are available at the end of Bitdefender’s whitepaper (PDF).

The Rise of Information Stealer Malwares

Threat intelligence company SEKOIA has also identified a new information stealer strain known as Stealc, which is advertised on the dark web and hacking forums as featuring an easy-to-use administration panel and extensive data-stealing capabilities. Unlike S1deload Stealer, the Stealc malware is distributed via fake cracked software, a popular tactic also used to push other info stealers such as Vidar, Redline, Raccoon, and Mars. As the threat of malware campaigns targeting social media users continues to rise, it is more important than ever to remain vigilant and take the necessary precautions to protect yourself online.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This