If you have a Facebook account and an Android phone. You must be aware of a new Trojan dubbed ‘FlyTrap’ that has compromised more than 10,000 Facebook accounts across 144 countries. How does FlyTrap trojan hijack Facebook accounts, how can you prevent yourself from being the victim of the attack, and what should you do if your account has been compromised? Let’s see the answers to all these questions in this post.
FlyTrap is a recently uncovered malware program added to the family of Trojans that leverage social engineering tricks to compromise victim’s Facebook accounts,
FlyTrap Trojan steals the victim’s Facebook accounts via trojanised Android applications and collects the victim’s Facebook ID, location, email address, IP address, cookies, and tokens associated with the Facebook account to carry out the further spread of malware by running disinformation campaigns.
It is also possible for FlyTrap Trojan to abuse the victim’s social credibility through personal messaging with links to the Trojan.
Facebook ID
Location
Email address
IP address
Cookies and tokens associated with the Facebook account.
Analysis report says there is no sign of targeting a specific group, community, geolocation, or country. Victims are around the globe. Since March 20201, This new Trojan has compromised more than 10,000 victims across 144 countries. The Zimperium zLabs mobile threat research team released a global map of victims.
By Zimperium’s zLabs mobile threat team
Before we go in-depth, we just want to tell you that FlyTrap Trojan initially distribute the trojanised Android application through google and third-party play stores. Google has removed the infected apps from its play store, but these applications are still available on many third-party play stores. Just downloading the infected Android apps is not enough for the Trojan to hijack the victim’s Facebook accounts. The malware uses a lot of social engineering tricks to make the user supply their credentials. Let see what social engineering tricks the malware uses to hijack the credentials in depth. And, How Does FlyTrap Trojan Hijack Facebook Accounts?
Actors behind the FlyTrap Trojan attract victims with many exciting offers such as free Netflix coupon codes, free Google AdWords coupon codes, and voting for the best football (soccer) team or player. They just make victims download and install the infected apps hosted on Google and other third-party play stores.
After users install the applications, those malicious applications engage users with their high-quality design pages and force the users to respond.
By Zimperium’s zLabs mobile threat team
By Zimperium’s zLabs mobile threat team
If a user came into the trap and responded, the apps will show the Facebook login page and ask him to log in to his Facebook account to get the free coupon. The fact is, no coupon code will get generated. But, the app tries to justify by showing a fake coupon code to the user. The truth is that the displayed Facebook login page was a phishing Facebook login page.
By Zimperium’s zLabs mobile threat team
By Zimperium’s zLabs mobile threat team
FlyTrap Trojan sitting inside the app will also use original and legit domains to capture the victim’s Facebook credentials using JavaScript injection techniques. According to Zimperium’s zLabs mobile threat team “Using this technique, the application opens the legit URL inside a WebView configured with the ability to inject JavaScript code and extracts all the necessary information such as cookies, user account details, location, and IP address by injecting malicious JS code.” Click here to read the original report.
Please Don’t install any untrusted applications either from Google Play store or any other third party play store.
Remove these apps from your phone installed knowingly or unknowingly.
Take the subscription of premium antimalware solutions and keep the definitions up to date.
Don’t click any unknown links.
Don’t come to the freebee trap. Always remember that “No meal will come for free.”
Don’t share any credentials with personal details.
Don’t log in or enter your credentials without confirmation.
Don’t allow access to use your phone’s camera, photos, messages, contacts for other third-party applications.
com.luxcarad.cardid : GG Voucher
com.gardenguides.plantingfree : Vote European Football
com.free_coupon.gg_free_coupon : GG Coupon Ads
com.m_application.app_moi_6 : GG Voucher Ads
com.free.voucher : GG Voucher
com.ynsuper.chatfuel : Chatfuel
Com.free_coupon.net_coupo n : Net Coupon
com.movie.net_coupon : Net Coupon
com.euro2021 : EURO 2021 Official
00833ff71a1709e60cb04acbcc7ceecd56323e693de3c424fb37205204d43105
fa08c2ca7d8614be2b0b58095d0f3115464e9139bf5051c4f3da15963bb31062
30a3ad09199660baca6410a4ada290887390d9453d95eb1e84bdd984c89ecc3a
8e6c98b247a2bb34d5004c3f14d2cbf2a22c987f960e86c760d44766f9361c59
21b85beb9992fccb268fcef2904c5e6591a3c80b7fa8dd201e28782887fea2cb
d1cf14ccbc8f718111e59f9173475b2882dc6d1ca381ff3b726f2b471711aa7e
c4eed338a3449c57eb919eac9a41b5b5ca4d0223fda341005e68f5b673d745ad
3b0137302a6b93cc4dd4d0a58749fc959f8d9ad26d022d6b10dc3d7608af3279
3cd5cee4326d48c0b1f0c40d3b8f3e0d7ef7ef2b782afbe95e07a3d519ba5aee
1a3b448853479bf6b23d283bd44b0458132c3cda1648eac631dfdc178aee5ac0
5d671f5ed5e5855dc5727412b2a9293f42b7b5f31c3b924a30beacd8304863b6
64f4f085050294d064860d0c9e323bbf21cb4f66773944646a9eaf4eab49e115
8e2aa1a1a144f84511aafd76c83a23e33c3c107c914bb67761df32f6b68b6cf5
96b235bc715d6089a163ca212d1e752c26918b3d3b1acec5bdebbdd1b40c4b85
f8845f98ca1233b6db2ef44913a115f3093308846ba805aaaf21753d97e4219c
hxxp://47.57.237.26
hxxp://165.232.173.244:3023
hxxps://manage-ads.com
hxxp://quanlysanpham.work
Thanks for reading the post. Please share this post and help to secure the digital world.
You may also like these articles:
How Does FMWhatsApp Hack Your SmartPhones? What You Should Do To Prevent It?
9 Android Apps Stealing Facebook Password Found On The Play Store!
How to Protect Your Android Device From The New BrazKing Android Malware?
9 New Fake Apps on the Play Store Which Can Hijack SMS Notifications to Carry Out Billing Fraud
How Do Attackers Takeover Twitter Accounts Using Twitter API Keys?
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.