Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Researchers expose campaign across Facebook which thrust malware over years


Researchers, recently, uncovered one network of A/Cs in Facebook, which masking behind topics and news related to Libya, thrust malware onto innumerable people's systems for around 5-yrs.


The discoverer of the massive sized campaign named "Operation Tripoli" were security investigators from Check Point Research a cyber-security firm. They detected that the campaign had been certain point of distribution of malicious software starting from 2014 at the minimum, with the capability of contaminating several thousand victims.


The investigators explain that the A/Cs, a few having more than 100,000 followers, enticed unwitting end-users into pursuing web-links followed with downloading files which were believed to informing regarding how terrorists were captured alternatively the most recent air strike inside Libya, however, actually delivered malware.


The investigators' attention towards the web-links leading onto 'Android' and 'Windows'-based malware was first drawn at the time they discovered those web-links inside Facebook postings coming supposedly from Libya's National Army commander Field Marshal Khalifa Haftar. The phony A/Cs that were formed during early April while carried over 11,000 followers posed as releasing documents depicting Turkey and Qatar the countries conspiring to harm Libya along with photographs of one pilot who was captured because he attempted at bombing Tripoli the country's capital. Remaining posts pledged towards providing mobile apps for Libyan citizens who wanted to enroll into the army. www.arstechnica.com posted this, July 2, 2019.


Check Point investigators further explain that while the attacker's tools was neither sophisticated nor any impressive, his customized content, genuine websites along with robustly active web-pages having a large number of followers were behind the simple way of infecting the victims.


After removal of the fake A/Cs, investigators commented about increasingly bad actors using social media for the dissemination of malware.


Last year during May, one malware campaign fast disseminated through Facebook while contaminated victims' computers for grabbing their account credentials on social media followed with downloading crypto-mining malware on their systems.
Facebook's officials state the above A/Cs and web-pages breached the company's policies so they disabled them following Check Point's reporting about the fakes. Now there's a continuing heavy investment into technology for preventing malicious operations on the social site.


» SPAMfighter News - 7/9/2019

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page