{"id":22084,"date":"2023-11-22T15:07:54","date_gmt":"2023-11-22T20:07:54","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/ducktail-steals-facebook-business-accounts\/22084\/"},"modified":"2023-11-24T15:37:16","modified_gmt":"2023-11-24T11:37:16","slug":"ducktail-steals-facebook-business-accounts","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/ducktail-steals-facebook-business-accounts\/22084\/","title":{"rendered":"Malware that steals Facebook accounts"},"content":{"rendered":"<p>Our researchers <a href=\"https:\/\/securelist.com\/ducktail-fashion-week\/111017\/\" target=\"_blank\" rel=\"nofollow noopener\">have discovered<\/a> a new version of malware from the Ducktail family. Cybercriminals are using it to target company employees who either hold fairly senior positions or work in HR, digital marketing, or social-media marketing. Their ultimate goal is to hijack Facebook Business accounts, so it makes sense that the attackers are interested in folks most likely to have access to them. Today, we talk about how attacks occur, what\u2019s unusual about them and, of course, how to protect yourself.<\/p>\n<h2>Bait and malicious payload<\/h2>\n<p>\nWhat the cybercriminals behind Ducktail do is send out malicious archive to their potential victims. To lull the recipient\u2019s vigilance, the archives contain bait in the form of theme-based images and video files on a common topic. For example, the theme of the most recent campaign (March to early October 2023) was fashion: emails were sent out in the name of big fashion industry players with archives containing photos of items of clothing.<\/p>\n<p>However, inside these archives were also executable files. These files had PDF icons and very long file names to divert the victim\u2019s attention from the EXE extension. Additionally, the names of the fake files appeared to be carefully chosen for relevance so as to persuade the recipients to click on them. In the fashion-themed campaign, the names referred to \u201cguidelines and requirements for candidates\u201d, but other bait like, say, price lists or commercial offers, can be used as well.<\/p>\n<div id=\"attachment_49847\" style=\"width: 1510px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/11\/23000905\/ducktail-steals-facebook-business-accounts-1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-49847\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/11\/23000905\/ducktail-steals-facebook-business-accounts-1.jpg\" alt=\"Contents of a malicious Ducktail archive \" width=\"1500\" height=\"996\" class=\"size-full wp-image-49847\"><\/a><p id=\"caption-attachment-49847\" class=\"wp-caption-text\">The malicious Ducktail archive contains a file that looks like a PDF but is in fact an EXE<\/p><\/div>\n<p>After clicking the disguised EXE file, a malicious script runs on the target device. Firstly, it does indeed display the contents of some PDF file embedded in the malware code, with the hope that the victim doesn\u2019t smell a rat. At the same time, the malware scans all the shortcuts on the desktop, the Start menu, and the Quick Launch toolbar. It searches for shortcuts to Chromium-based browsers, such as Google Chrome, Microsoft Edge, Vivaldi, Brave\u2026 Having found one, the malware alters its command line by adding an instruction to install a browser extension, which is also embedded in the executable file. Five minutes later, the malicious script terminates the browser process, prompting the user to restart it using one of the modified shortcuts.<\/p>\n<h2>Malicious browser extension<\/h2>\n<p>\nAfter the user clicks the shortcut, a malicious extension is installed in the browser, where it convincingly masquerades as Google Docs Offline, using the exact same icon and description (though only in English, which can give away the fake in some regions).<\/p>\n<div id=\"attachment_49846\" style=\"width: 1010px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/11\/23000915\/ducktail-steals-facebook-business-accounts-2-EN.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-49846\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/11\/23000915\/ducktail-steals-facebook-business-accounts-2-EN.jpg\" alt=\"Malicious browser extension \" width=\"1000\" height=\"273\" class=\"size-full wp-image-49846\"><\/a><p id=\"caption-attachment-49846\" class=\"wp-caption-text\">The malicious extension masquerading as Google Docs Offline (left), and the real Google Docs Offline extension (right) in the Google Chrome browser<\/p><\/div>\n<p>Once installed and running, the malicious extension starts constantly monitoring all tabs opened by the user in the browser and sending information about them to the attackers\u2019 C2 server. If it finds an address associated with Facebook among the opened tabs, the malicious extension checks for Ads and Business accounts and then hijacks them.<\/p>\n<p>The extension steals information from Facebook accounts logged into on the victim\u2019s device, as well as active session cookies stored by the browser, which can be used to sign in to the accounts without authentication.<\/p>\n<p>The group behind the malware has <a href=\"https:\/\/gridinsoft.com\/blogs\/ducktail-malware-analysis\/\" target=\"_blank\" rel=\"nofollow noopener\">reportedly<\/a> been active since 2018. <a href=\"https:\/\/labs.withsecure.com\/publications\/ducktail\" target=\"_blank\" rel=\"nofollow noopener\">Several<\/a> research teams believe it has Vietnamese origin. The group\u2019s distribution of Ducktail can be pinpointed to 2021.<\/p>\n<h2>How to guard against Ducktail<\/h2>\n<p>\nTo protect against Ducktail and similar threats, employees need to simply observe basic digital hygiene; in particular:<\/p>\n<ul>\n<li>Never download suspicious archives on work computers \u2014 especially if the links come from untrusted sources.<\/li>\n<li>Carefully check the extensions of all files downloaded from the internet or email before opening them.<\/li>\n<li>Never click on a file that looks like a harmless document but has an EXE extension \u2014 this is a clear sign of malware.<\/li>\n<li>Always install <a href=\"https:\/\/me-en.kaspersky.com\/small-business-security\/small-office-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksos___\" target=\"_blank\" rel=\"noopener\">reliable protection<\/a> on all work devices.This will warn you of potential danger and defeat any attacks in time. Our solutions detect this threat with the verdict <a href=\"https:\/\/threats.kaspersky.com\/en\/threat\/HEUR:Trojan.Win64.Ducktail.gen\" target=\"_blank\" rel=\"noopener nofollow\">HEUR:Trojan.Win64.Ducktail.gen<\/a>.<\/li>\n<li>You can find indicators of compromise as well as more technical details on this malware in the respective <a href=\"https:\/\/securelist.com\/ducktail-fashion-week\/111017\/\" target=\"_blank\" rel=\"noopener\">Securelist blog post<\/a>.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksos-generic\">\n","protected":false},"excerpt":{"rendered":"<p>How attackers use infected archives and malicious browser extensions to steal Facebook Business accounts.<\/p>\n","protected":false},"author":2726,"featured_media":22086,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917,1486],"tags":[1474,1636,1151,20,187,2151,521,113],"class_list":{"0":"post-22084","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"category-threats","10":"tag-accounts","11":"tag-browsers","12":"tag-extensions","13":"tag-facebook","14":"tag-passwords","15":"tag-stealers","16":"tag-threats","17":"tag-windows"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ducktail-steals-facebook-business-accounts\/22084\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ducktail-steals-facebook-business-accounts\/26659\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ducktail-steals-facebook-business-accounts\/29409\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ducktail-steals-facebook-business-accounts\/26943\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ducktail-steals-facebook-business-accounts\/26886\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ducktail-steals-facebook-business-accounts\/29447\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ducktail-steals-facebook-business-accounts\/36587\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ducktail-steals-facebook-business-accounts\/49845\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ducktail-steals-facebook-business-accounts\/21282\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ducktail-steals-facebook-business-accounts\/22060\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ducktail-steals-facebook-business-accounts\/30726\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ducktail-steals-facebook-business-accounts\/27210\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ducktail-steals-facebook-business-accounts\/32934\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ducktail-steals-facebook-business-accounts\/32583\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/extensions\/","name":"extensions"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22084","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22084"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22084\/revisions"}],"predecessor-version":[{"id":22092,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22084\/revisions\/22092"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22086"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22084"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22084"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22084"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}