Malware, Data Security

Novel Ov3r_Stealer malware spread via fraudulent Facebook job ads

Attacks leveraging fraudulent Facebook job ads have been launched to facilitate the distribution of the new Ov3r_Stealer information-stealing malware that targets credentials, Microsoft Office documents, browser extensions, cryptocurrency wallets, and credit card information, according to The Hacker News. Threat actors have used a Facebook account impersonating Amazon CEO Andy Jassy and Facebook digital advertising job ads to spread a malicious PDF that lures targets into clicking an embedded "Access Document" button, which would later redirect to a .URL file posing as a Discord content delivery network-hosted DocuSign document, a report from Trustwave SpiderLabs showed. Such a file would later facilitate control panel item file delivery and PowerShell loader retrieval before triggering Ov3r_Stealer. Further investigation into Ov3r_Stealer's infection chain revealed similarities with the Phemedrone Stealer which has leveraged the high-severity Windows Defender SmartScreen bypass vulnerability, tracked as CVE-2023-36025 prompting researchers to suggest that the new malware may have been repurposed from Phemedrone.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds