Throughout 2024, Bitdefender Labs has been closely monitoring a series of malvertising campaigns that exploit popular platforms to spread malware. These campaigns use fake advertisements to lure users into installing malicious software disguised as legitimate apps or updates.
One of the more recent campaigns Bitdefender Labs uncovered involves a fake Bitwarden extension advertised on Meta’s social media platform Facebook. The campaign tricks users into installing a harmful browser extension under the guise of a security update.
Key findings include:
Once again, this campaign highlights how threat actors exploit trusted platforms like Facebook to lure users into compromising their own security. By masquerading as a reputable tool and imitating urgent update notifications, cybercriminals gain access to valuable personal and business information.
Thanks to Bitdefender Labs’ research, we now have a clearer understanding of the evolving tactics used in this type of attacks:
1. Step One: Fake Ads to Lure Users In
The attack begins with a deceptive Facebook ad that warns users that their passwords are at risk and urges them to update their Bitwarden browser extension. The ad looks legitimate, using Bitwarden branding and urgent language, such as "Warning: Your Passwords Are at Risk!" to push users into action.
Clicking on the ad takes users to a fake webpage designed to mimic the official Chrome Web Store. When users click "Add to Chrome," they are redirected to a Google Drive link containing a zip file with the malicious extension. Attackers guide users through a process to install the extension by:
This method manipulates users into bypassing browser security checks, allowing the malware to install without detection.
2. Malicious Extension Details: Full Access and Suspicious Permissions
Once installed, the malicious extension requests extensive permissions that allow it to intercept and manipulate the user’s online activities. A closer look at the extension’s manifest file reveals permissions to operate on all websites, modify network requests, and access storage and cookies. Key aspects of the manifest include:
{
"name": "Bitwarden Password Manager",
"version": "0.0.1",
"manifest_version": 3,
"background": {
"service_worker": "service-worker-loader.js",
"type": "module"
},
"permissions": [
"contextMenus",
"storage",
"cookies",
"tabs",
"declarativeNetRequest",
"webNavigation",
"webRequest",
"management"
]
}
The extension’s service-worker-loader.js script initiates background.js, the primary component driving the malicious operations. Additionally, popup.js—an obfuscated script—loads when users click the extension icon in their browser, enabling it to:
3. Background Worker: Collecting and Exfiltrating Data
The background.js script, which activates upon installation, is the core of this attack.
chrome.runtime.onInstalled.addListener(async details => {
getFacebookCookies();
});
Here’s how it operates:
Once collected, the data is sent to a Google Script URL, which acts as the command-and-control (C2) server for the attackers. The sendData() function handles data exfiltration by encoding and transmitting sensitive information.
4. Detection and Defense Strategies
Detecting and mitigating this attack is a challenge for cybersecurity teams due to its reliance on legitimate platforms like Facebook and Google Drive. Here are some detection ideas for security professionals:
To protect yourself from similar malvertising campaigns, follow these essential security tips:
6. Use a Security Solution: Protect yourself from malvertising and phishing attacks by using a reliable security solution like Bitdefender Total Security. A comprehensive security solution detects and blocks malicious links, phishing attempts, and unauthorized browser extensions, adding an extra layer of protection.
Pro tip: Use Bitdefender Scamio to deter scams and malicious ads.
Bitdefender Scamio is a must-have scam detection tool for netizens who want to steer clear of scams and malicious ads while browsing or interacting on their social media feeds. Scamio is our FREE on-demand scam detector you can use to check for any scammy link or proposal you see online.
Scamio can analyze any texts, messages, links, QR codes, or images and give you a verdict on whether they are part of a scam. Scamio is available on Facebook Messenger, WhatsApp, your web browser and Discord.
Let’s see what Scamio had to say about the ad:
You can also help others stay safe by sharing Scamio with them in France, Germany, Spain, Italy, Romania, Australia, and the UK.
Additionally, with the launch of our new Scam Copilot, you can get comprehensive scam protection across all of your devices with access to your personal scam adviser chatbot, scam wave alerts in your area, real-time detection of scams in your browsing activities and remote access scam protection among others. The Scam Copilot features paired with our award-winning anti-malware protection can be found in our all-one-security solutions.
tags
Andrei is a graduate in Automatic Control and Computer Engineering and an enthusiast exploring the field of Cyber Threat Intelligence.
View all postsJune 08, 2023
May 02, 2023
January 11, 2023
January 05, 2023