Vulnerabilities / Threats

4/30/2018
08:15 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Old Worm, New Tricks: FacexWorm Targets Crypto Platforms

Malicious Chrome extension FacexWorm has reappeared with new capabilities, targeting cryptocurrency platforms and lifting user data.

FacexWorm, a malicious Chrome extension, has been rediscovered targeting cryptocurrency trading platforms and spreading via Facebook Messenger. The Cyber Safety Solutions team at Trend Micro reports it's packing a few new capabilities, including the ability to steal user data.

The extension was first detected in August 2017 and returned the following April amid reports of increased appearances in Germany, Tunisia, Japan, Taiwan, South Korea, and Spain. Like the original, it sends socially-engineered links to friends of affected Facebook account holders.

Unlike the original, it steals accounts and credentials related to FacexWorm's targeted sites. The attack takes potential victims to websites where it injects malicious cryptomining code and redirects to the attacker's referral link for crypto-related referral programs. It hijacks transactions in trading platforms by replacing the recipient address with the attacker's.

The attacker gets a referral incentive every time a victim registers an account, researchers report. Targeted websites include Binance, DigitalOcean, FreeBitco.in, FreeDoge.co.in, and HashFlare.

FacexWorm arrives on victims' machines via socially-engineered Facebook links. Those who click are redirected to a fake YouTube page where they are prompted to install a codec extension (FacexWorm) to play a video. The extension requests privilege to access and edit data on the site.

If permission is granted, FacexWorm downloads malicious codes from its command-and-control server, opens Facebook's website, and checks to see if the propagation function is turned on. If it is, the extension requests an OAuth token from Facebook and begins obtaining the target account's friend list. Contacts who are online or idle are sent fake YouTube links.

"FacexWorm is a clone of a normal Chrome extension but injected with short code containing its main routine," explains Trend Micro fraud researcher Joseph Chen in a blog post on the finding. The threat downloads more code from the C&C server when the browser is opened.

"Every time a victim opens a new webpage, FacexWorm will query its C&C server to find and retrieve another JavaScript code (hosted on a Github repository) and execute its behaviors on that webpage." This JavaScript code, or miner, is an obfuscated Coinhive script connected to a Coinhive pool, configured to use 20% of the target system's CPU power for each threat.

FacexWorm exhibits other malicious behaviors like stealing account credentials for Google, MyMonero, and Coinhive. This threat targets a total of 52 cryptocurrency platforms. When it detects anyone accessing any of them or using keywords like "blockchain" or "ethereum" in the URL, it redirects the user to a fraudulent webpage.

This threat only works in Chrome. If the malicious link is accessed through any browser other than the Chrome desktop version, it redirects to a random advertisement. Trend Micro has only spotted one Bitcoin transaction compromised by FacexWorm based on monitoring the attacker's wallet. Researchers haven't determined how much money the threat has generated.

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
4/30/2018 | 11:09:11 PM
Performance Impact
I would be surpirsed if this gained legs. If a user takes a 20% cpu hit they are most likely going to report a performance impact.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
4/30/2018 | 11:07:03 PM
Facebook
Talk about kicking facebook while their down. Using Facebook messenger as the medium seems apropos. 
Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
The Morris Worm Turns 30
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/9/2018
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12174
PUBLISHED: 2018-11-14
Heap overflow in Intel Trace Analyzer 2018 in Intel Parallel Studio XE 2018 Update 3 may allow an authenticated user to potentially escalate privileges via local access.
CVE-2018-3621
PUBLISHED: 2018-11-14
Insufficient input validation in the Intel Driver & Support Assistant before 3.6.0.4 may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
CVE-2018-3635
PUBLISHED: 2018-11-14
Insufficient input validation in installer in Intel Rapid Store Technology (RST) before version 16.7 may allow an unprivileged user to potentially elevate privileges or cause an installer denial of service via local access.
CVE-2018-3696
PUBLISHED: 2018-11-14
Authentication bypass in the Intel RAID Web Console 3 for Windows before 4.186 may allow an unprivileged user to potentially gain administrative privileges via local access.
CVE-2018-3697
PUBLISHED: 2018-11-14
Improper directory permissions in the installer for the Intel Media Server Studio may allow unprivileged users to potentially enable an escalation of privilege via local access.