Chrome Lure Used in Facebook Attack despite Google’s New Policy

Just how effective is it for cybercriminals to keep using Google Chrome and Facebook to infect their victims with malware?

We’ve already seen both platforms be used as parts of malicious social engineering schemes. Both Google and Facebook are aware of this and have taken steps to protect their users. The number of times malicious Chrome extensions have sprouted, for example, has driven Google to restrict the use of any extension not available on the Chrome Web Store.

Unfortunately, initiatives like these have not deterred cybercriminal efforts. Our findings also show that many of these platforms users still get tricked.

Just recently, I received a message from a Facebook friend that piqued our curiosity. The message was rather short and to the point:

Figure 1. Message on Facebook

Clicking the link led us to a site with a page designed to mimic the look and feel of Facebook. The page even pretends to have content from YouTube. Visiting the malicious site led to the automatic download of a file titled Chrome_Video_installer.scr.  The filename used makes it seem that it’s a harmless Chrome browser plugin required to play videos.

Figure 2. Malicious page with the Facebook design

This supposed video installer file is detected as TROJ_KILIM.EFLD. This variant attempts to download another file—possibly the final payload—but the site is currently down. However, it should be noted that KILIM malware are known to be malicious Chrome extensions and plugins.  KILIM variants have also been observed to spam Facebook messages and cause system infection.

Prominent victims

Using feedback we gathered from the Smart Protection Network™, we decided to see which countries were the most affected by this particular attack.

We checked the landing page and found out that the Philippines had the most number of users who visited the site, followed by those from Indonesia, India, Brazil, and the U.S. What’s striking is the fact that these countries are the same ones reported to have the highest percentage in terms of Facebook penetration.

Country Percentage
Philippines 36%
Indonesia 6%
India 6%
Brazil 6%
US 5%
Australia 3%
Taiwan 3%
Japan 3%
Thailand 2%
Qatar 2%

Table 1. Countries with the most visits to the malicious site

Facebook still remains the top social networking site in the world. Data from their company information page reveals that Facebook has 1.44 billion monthly and 1.25 billion mobile monthly active in March 2015. A sizeable percentage (around 83%) of users who are active on the site daily are from outside Canada and the U.S. This popularity obviously doesn’t come without pitfalls.

The compelling elements

In this attack, users might be fooled into clicking the link because of three things. First, the message comes from a Facebook friend, not a stranger. The message also addresses the user through the name he uses on Facebook. This makes it appear less like a random, spammed message. The informality of the message may compel the user to read the message.

The use of the shortened link also helps disguise the lure. Compared to a more innocent-looking shortened link, a suspicious-looking URL might cause a user to reconsider clicking.

The filename of the malware can also put the intended victim at ease. Extensions and plugins are part of the Chrome browser ecosystem. Meanwhile, a simple online search can inform the user that the .SCR file extension is often used for screensavers—not necessarily something they would immediately think as malicious.

Facing Facebook threats

Given the popularity of Facebook, members of the site must be discerning when it comes to dealing with the content they come across with. Never click links from unknown or unverified sites, especially if the content sounds too interesting to be true. Cybercriminals often use shocking or eye-catching content to convince users to visit malicious websites. It’s far better to click links that lead to a reputable source than some random blog or site. The Trend Micro Site Safety Center can also be used to check if websites are safe or not.

The same can be said for links or attachments sent by friends. It’s worth the effort to first confirm the message before clicking the link or opening the attachment.

Facebook safety doesn’t begin and end with safety measures for the website. Other precautions like screening emails and installing a security solution can prevent malware from infecting your computers and accessing your Facebook accounts.

We have reported this incident to Facebook. As of this publishing, Facebook has marked the message as spam.

With additional insight from Jed Valderamma.

Hashes for related file:

  • ed263d766342df6cb87c4405441f2f547557ffd2

Post from: Trendlabs Security Intelligence Blog – by Trend Micro

Chrome Lure Used in Facebook Attack despite Google’s New Policy

Read more: Chrome Lure Used in Facebook Attack despite Google’s New Policy

Story added 27. May 2015, content source with full text you can find at link above.