Skip to content

TFORTRENDZ

Be Trendy With TFORTRENDZ

  • Home
  • What’s Hot
  • Gadgets
  • Automobile
  • Social
  • Fashion
  • Health
  • Beauty
  • Client Portal

New Dangerous Malware Spreading Fast Via Facebook Messenger.

December 26, 2017October 8, 2018 TforTrends

A new cryptocurrency-mining bot, named “Digmine” ( Malware ), that was first observed in South Korea, is spreading fast through Facebook Messenger across the world, Tokyo-headquartered cyber security major Trend Micro has warned. After South Korea, it has since spread in Vietnam, Azerbaijan, Ukraine, the Philippines, Thailand and Venezuela. It is likely to reach other countries soon, given the way it propagates. Facebook Messenger works across different platforms but “Digmine” ( Malware ) only affects the Messenger’s desktop or web browser (Chrome) version. If the file is opened on other platforms, the malware will not work as intended, Trend Micro said in a blog post. “Digmine” ( Malware ) is coded in AutoIt and sent to would-be victims posing as a video file but is actually an AutoIt executable script. If the user’s Facebook account is set to log in automatically, “Digmine” ( Malware ) will manipulate Facebook Messenger in order to send a link to the file to the account’s friends.

The abuse of Facebook is limited to propagation for now, but it wouldn’t be implausible for attackers to hijack the Facebook account itself down the line. This functionality code is pushed from the command-and-control (C&C) server, which means it can be updated. A known modus operand of cryptocurrency-mining botnets and particularly for “Digmine” (which mines Monero), is to stay in the victim’s system for as long as possible. It also wants to infect as many machines as possible, as this translates to an increased hash rate and potentially more cyber criminal income, the blog post stated.

The malware will also perform other routines such as installing a registry auto start mechanism as well as system infection marker. It will search and launch Chrome then load a malicious browser extension that it retrieves from the C&C server.

If Chrome is already running, the malware will terminate and relaunch Chrome to ensure the extension is loaded. While extensions can only be loaded and hosted from the Chrome Web Store, the attackers bypassed this by launching Chrome via command line.

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)

Like this:

Like Loading...

Related

Tagged with Autolt, bot, chrome, cyber security, Digmine, facebook malware, Facebook Messenger, Facebook news, facebook privacy alert, facebook virus, malware 2017, new malware, new virus, security threat, Social trends, Social trends 2018, Tfortrends, Tokyo based malware, trending, trends 2018, Trends in Social Media, virus, virus alert, virus trends
  • Home
  • Social
  • What's Hot

Post navigation

Previous Post

Zanco Tiny T1 : World’s Smallest Mobile Phone (Price & Specifications).

Next Post

Legal Notice To WhatsApp : Remove ‘Middle Finger’ Emoji.

SOCIAL

  • Pinterest
  • LinkedIn
  • Facebook
  • Instagram
  • Twitter

Top Posts & Pages

  • Symptoms Of Heart Attack
  • Instagram Algorithm 2025 Update: What Every Creator Needs to Know to Stay Ahead
  • Client Portal
  • 5 Hidden Phone Features You Never Knew Existed
  • Everything You Need To Know About Inflammation

Most Recent Comments

    Pages

    • About Us
    • Client Portal
    • Contact Us
    • Home
    • Privacy Policy
    WordPress Theme: Dynamico by ThemeZee.
     

    Loading Comments...
     

      %d bloggers like this: