logo
Weaponizing Facebook Ads: Inside The Multi-Stage Malware Campaign Exploiting Cryptocurrency Brands

Weaponizing Facebook Ads: Inside The Multi-Stage Malware Campaign Exploiting Cryptocurrency Brands

Scoop09-05-2025

A persistent malvertising campaign is plaguing Facebook, leveraging the reputations of well-known cryptocurrency exchanges to lure victims into a maze of malware. Since Bitdefender Labs started investigating, this evolving threat has posed a serious risk by deploying cleverly disguised front-end scripts and custom payloads on users' devices, all under the guise of legitimate cryptocurrency platforms and influencers.
This report unveils how the attackers use advanced evasion tactics, mass brand impersonation, and sophisticated user-tracking methods to bypass conventional defences and maintain a large pool of victims.
Key Findings
Ongoing attack: This malvertising campaign has been operating for several months, consistently producing new advertisements. It heavily leverages the imagery and trust associated with cryptocurrency brands, and it remains active with fresh ads appearing regularly.
Front-end–back-end collaboration: Malware is delivered via covert communication between the malicious website's front end and local host, a method that evades detection by most security vendors. By orchestrating malware deployment through a seemingly harmless intermediary, attackers remain stealthy.
Mass brand impersonation: Researchers at Bitdefender Labs identified hundreds of ads impersonating trusted cryptocurrency exchanges and trading platforms, including Binance and TradingView. By mimicking well-known brands, the attackers drastically increase the odds that victims will click the malicious ads.
Advanced tracking and evasion: The threat actors use sophisticated anti-sandbox checks, only delivering malware to users who meet specific demographic or behavioural profiles. Query parameters related to Facebook Ads are used to detect legitimate victims, while suspicious or automated analysis environments receive benign content.
Campaign and malware delivery: Cybercriminals use Meta's ad network to tout quick financial gains and crypto bonuses, with some ads seeking to bolster credibility by featuring the image of public figures such as Elon Musk, Zendaya, and Cristiano Ronaldo (with whom Binance teamed up to release an NFT collection).
Clicking one of these ads redirects victims to a site that impersonates a known cryptocurrency platform (Binance, TradingView, ByBit, SolFlare, MetaMask, Gate.io, MEXC, etc.), instructing them to download a 'desktop client'.
However, if the site detects suspicious conditions (e.g., missing ad-tracking parameters or an environment typical of automated security analysis), it displays harmless, unrelated content instead.
Here's what Bitdefender Labs researcher Ionut Baltariu noticed about the tracking and filtering techniques threat actors use in this campaign:
Users cannot load the root website
No malicious content will be displayed for users who loaded the website without the specific query parameters of the Facebook ads – some examples being utm_campaign, utm_content, fbid, cid
If the user is not logged into Facebook or if the IP address and operating system don't interest the attackers, the website will not display malicious content. Users will be served with unrelated content instead. The same might happen if the victim does not fit the behavioural profile the threat actors seek (e.g., male, interests in technology and cryptocurrency).
Newer variants take a step further, prompting users to open the site using Microsoft Edge; opening it with other browsers leads to random, non-malicious content, further complicating detection efforts.
One particularly deceptive instance is a Facebook clone that mirrors TradingView's official Facebook page. From the profile pictures to posts and comments touting a free 'Annual Ultimate Subscription', everything is fabricated, except for the central buttons that redirect victims to the real Facebook website.
The Scale of the Campaign
Researchers have uncovered hundreds of Facebook accounts promoting these malware-delivering pages, all pushing financial benefits. In one notable example, a single page ran over 100 ads in a single day (April 9, 2025). While many ads are quickly removed, some garner thousands of views before takedown. Targeting is frequently fine-tuned, like focusing on men aged 18+ in Bulgaria and Slovakia – to maximise impact.
In this example, we can see an ad that specifically targeted 18+ years old men, with success in Bulgaria and Slovakia.
How the Malware Works
All analysed malware samples had the name 'installer.msi' and measured around 800 kb. After installation, the malicious software would open the page of the impersonated entity through msedge_proxy.exe. Victims also receive a suspicious DLL file that launches a local .NET-based server on ports 30308 or 30303 (in a newer version).
This server offers two enabling remote payload execution and customised data exfiltration via WMI queries:
/set (or /s in newer versions)
/query (or /q in newer versions)
The /set route receives a payload in XML format through the request body that can be executed through Task Scheduler, while the /query route allows the execution of custom WMI queries, exfiltrating the machine ID and WMI query responses.
Interestingly, the sample does not seem to start other processes that might use this simple API. After all, if it had been wanted, data could have already been exfiltrated. This is where an interesting script from the Front-End (the malicious page) comes into effect.
While carefully analysing the requests made by the website after it loads, one might not see anything that raises suspicions. However, when investigating the loaded resources, a malicious script can be found:
After deobfuscating, this script creates a SharedWorker that solves the mystery of the lonely localhost:30308 server. Inside the shared worker, we can see a /query route with three WMI queries. Furthermore, the script also suppresses output from common console commands.
The shared worker communicates with the parent script (using the postMessage function) to fully orchestrate the malware deployment using the localhost server. Moreover, it uses another API from which it gathers the initial malicious file and future payloads, guaranteeing custom and possibly ever-evolving payloads.
After receiving the WMI query results, the FrontEnd script can choose to also use the /set route to schedule a task for execution. In the analysed case sample, the /set command was used to further execute multiple encoded PowerShell scripts. This chain of encoded commands concluded with a script that downloaded another malicious payload from two possible C&C servers.
For an indefinite period of time, the PowerShell script retrieves other scripts from the C2 servers ($APIs) and executes them, sleeping for limited amounts of time between requests. An example of executed scripts proceeds to exfiltrate further data from the infected system, such as installed software, available GPUs, the geographical location from HKEY_CURRENT_USER\Control Panel\International\Geo and system, OS and BIOS information (doubling the effort done in the first stage, done using WMI queries from the Front-End script).
Depending on the exfiltrated payload (the C2 might deploy custom payloads depending on the type of victim, with possible inferences being made about dynamic analysis attempts), the malicious APIs can return other malicious scripts. One example we have encountered is a PowerShell that further downloads a Node.js build, a series of executables and a .jsc file. If the exfiltrated data resembles an automated flow or a sandboxing environment, we have observed 'malicious' payloads that only execute a sleep command for hundreds of hours on end, indicating that the infection chain is likely to end at that step.
Conclusions
This campaign showcases a hybrid approach, merging front-end deception and a localhost-based malware service. By dynamically adjusting to the victim's environment and continuously updating payloads, the threat actors maintain a resilient, highly evasive operation. During analysis, Bitdefender was one of the few security solutions detecting both the malicious DLL and the front-end scripts with generic signatures.
Multiple layers of obfuscation, sandbox checks, and real-time payload evolution make this campaign a sophisticated challenge for researchers and security providers. Throughout the analysis we have faced and uncovered multiple techniques that prevent end-to-end analysis of the threat – from the measures taken on the malicious websites (displaying non-malicious content based on traffic metadata), to anti-sandbox actions (for example, the looped PowerShell task would not download the final payload in dynamic analysis environments).
Combined with the social engineering potential of Facebook Ads and cryptocurrency hype, it underscores how otherwise 'common' threats can reach new levels of complexity.
Bitdefender Detections
Generic.MSIL.WMITask – Malicious DLLs
Generic.JS.WMITask – Malicious JavaScript files on the websites
Trojan.Agent.GOSL – Malicious JavaScript in the final-stage payload
Early activation of these signatures blocked thousands of infection attempts globally, protecting Bitdefender customers from falling prey to this campaign.
How users can stay safe:
Scrutinise Ads: Be cautious with any ad offering free software or incredible financial gains. Always verify the source before clicking links or downloading content.
Use Official Sources Only: Download software directly from the vendor's website. Examples from this campaign include official pages for TradingView, Binance, and MetaMask.
Use Dedicated Scam and Link-Checking Tools: Bitdefender Scamio and Link Checker can help you verify a website's legitimacy before you click or share. These tools provide an additional layer of defence by scanning URLs and alerting you to potential scams or malicious content.
Keep Security Software Updated: Choose a reputable security solution capable of detecting evolving threats. Regular updates ensure you have the latest protection mechanisms.
Beware of Browser Restrictions: If a page insists on using a specific browser or looks suspiciously polished while being otherwise non-functional, close it immediately.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Musk vows to stay Trump's 'friend' in bizarre black-eyed farewell
Musk vows to stay Trump's 'friend' in bizarre black-eyed farewell

RNZ News

time8 hours ago

  • RNZ News

Musk vows to stay Trump's 'friend' in bizarre black-eyed farewell

By Danny Kemp, AFP Elon Musk gestures to his eye during a news conference with US President Donald Trump in the Oval Office of the White House in Washington, DC, on 30 May. 2025. Photo: ALLISON ROBBERT / AFP Billionaire Elon Musk has bid farewell to Donald Trump in an extraordinary Oval Office appearance in which he sported a black eye, brushed aside drug abuse claims and vowed to stay a "friend and advisor" to the US president. As the world's richest person bowed out of his role as Trump's cost-cutter-in-chief, the Republican hailed Musk's "incredible service" and handed him a golden key to the White House. But Trump insisted that Musk was "really not leaving" after a turbulent four months in which his Department of Government Efficiency (DOGE) cut tens of thousands of jobs, shuttered whole agencies and slashed foreign aid. "He's going to be back and forth," said Trump on Friday, showering praise on the tech tycoon for what he called the "most sweeping and consequential government reform programme in generations". South-African born Musk, wearing a black T-shirt with the word "Dogefather" in white lettering and a black DOGE baseball cap, said many of the US$1 trillion savings he promised would take time to bear fruit. "I look forward to continuing to be a friend and advisor to the president," he said. But many people were more interested in the livid black bruise around Musk's right eye. Speculation about the cause was further fuelled by accusations in the New York Times on Friday that Musk used so much of the drug ketamine on the 2024 campaign trail that he developed bladder problems. The SpaceX and Tesla magnate said his son was to blame for the injury. "I was just horsing around with lil' X, and I said, 'Go ahead punch me in the face,'" 53-year-old Musk said. "And he did. Turns out even a five-year-old punching you in the face actually is..." he added, before tailing off. Musk, however, dodged a question about the drug allegations. The New York Times said Musk, the biggest donor to Trump's 2024 election campaign, also took ecstasy and psychoactive mushrooms and travelled with a pill box last year. Musk, who has long railed against the news media and championed his X social media platform as an alternative, took aim at the paper instead. "Is that the same publication that got a Pulitzer Prize for false reporting on the Russiagate?" said Musk, referring to claims that Trump's 2016 election campaign colluded with Moscow. "Let's move on. Okay. Next question." The White House had earlier played down the report. "The drugs that we're concerned about are the drugs running across the southern border" from Mexico, said Trump's deputy chief of staff Stephen Miller, whose wife works for Musk. Musk has previously admitted to taking ketamine, saying he was prescribed it to treat a "negative frame of mind" and suggesting his use of drugs benefited his work. Elon Musk vows to say "friend and advisor" to US President Donald Trump after leaving the White House. Photo: Brendan Smialowski / AFP The latest in a series of made-for-TV Oval Office events was aimed at putting a positive spin on Musk's departure. Musk is leaving Trump's administration under a cloud, after admitting disillusionment with his role and criticising the Republican president's spending plans. It was a far cry from his first few weeks as Trump's chainsaw-brandishing sidekick. At one time Musk was almost inseparable from Trump, glued to his side on Air Force One, Marine One, in the White House and at Trump's Mar-a-Lago resort in Florida. The right-wing magnate's DOGE led an ideologically-driven rampage through the federal government, with its young "tech bros" slashing tens of thousands of jobs. But DOGE's achievements fell far short of Musk's original goal of saving $2 trillion. The White House says DOGE has made US$170 billion in savings so far. The independent "Doge Tracker" site has counted just US$12 billion while the Atlantic magazine put it far lower, at US$2 billion. Musk's "move fast and break things" mantra was also at odds with some of his cabinet colleagues, and he said earlier this week that he was "disappointed" in Trump's planned mega tax and spending bill as it undermined DOGE's cuts. Musk's companies, meanwhile, have suffered. Tesla shareholders called for him to return to work as sales slumped and protests targeted the electric vehicle maker, while SpaceX had a series of fiery rocket failures. - AFP

Trump fights tariff court ruling; Boeing to resume China delivery
Trump fights tariff court ruling; Boeing to resume China delivery

National Business Review

timea day ago

  • National Business Review

Trump fights tariff court ruling; Boeing to resume China delivery

Kia ora and welcome to your Friday summary of the key international business and political stories dominating headlines. First, there has been a wave of global reaction, including on NBR, to the court decision that US President Donald Trump overstepped the mark with his restrictive trade tariffs. Overnight, the Trump administration said it would go to the US Supreme Court on Friday local time if it is unable to block the ruling, the BBC reported. White House Press Secretary Karoline Leavitt said, "we will win this battle in court" as the administration attempted to tackle 'rogue judges'. The court ruling did not address tariffs imposed on some specific goods – such as vehicles, steel, and aluminium. BBC reporters Peter Hoskins and Yang Tian said a higher court might be more Trump-friendly. But they said if all the courts in the appeal process upheld the ruling, businesses who had to pay tariffs would receive refunds with interest. Meanwhile, Trump's efficiency manager Elon Musk said he was leaving his role in the Trump administration, after leading the Department of Government Efficiency (DOGE). 'As my scheduled time as a Special Government Employee comes to an end, I would like to thank President @realDonaldTrump for the opportunity to reduce wasteful spending,' Musk wrote on social media. 'The DOGE mission will only strengthen over time as it becomes a way of life throughout the government.' Former DOGE leader Elon Musk. In developing news, a US judge issued an injunction blocking the Trump administration from revoking Harvard University's ability to enrol international students, the ABC reported. The university denied allegations that it had a bias against conservatives and was antisemitic. The Trump administration said it would use a lengthier process to attempt to stop Harvard from enrolling international students. It marked the latest twist after Trump removed billions of US dollars in federal funding to the university. As well, US Secretary of State Marco Rubio said it planned to 'aggressively revoke' the visas of Chinese students studying in the country. Rubio announced the decision, in addition to a State Department statement titled: 'New Visa Policies Put America First, Not China'. 'We will also revise visa criteria to enhance scrutiny of all future visa applications from the People's Republic of China and Hong Kong,' the statement said. China's Ministry of Foreign Affairs criticised the decision, noting it 'seriously damaged' the rights of Chinese students, Al Jazeera reported. Meanwhile, manufacturer Boeing said airplane deliveries to China would resume in June after handovers were paused amid the trade tariff war, CNBC reported. Chief executive Kelly Ortberg said China had originally paused deliveries but was now ready to take planes again. Boeing had been paying tariffs on imported components from Italy and Japan for its wide-body Dreamliner planes, made in South Carolina. Ortberg said much of that could be recouped when the planes get exported. Federal Reserve chair Jerome Powell. Trump has held a heated meeting with Federal Reserve chair Jerome Powell, when he asked the top banker to lower interest rates, Bloomberg reported. It was their first in-person meeting since the Trump's inauguration. Leavitt told reporters that Trump thought Powell was making a mistake by not lowering rates. '[That] is putting us at an economic disadvantage to China and other countries, and the President's been very vocal about that, both publicly and, now I can reveal, privately.' Powell's term expires in May 2026. Finally, Israel accepted a new proposal for a ceasefire with Hamas in Gaza from US special envoy Steve Witkoff, according to officials, CNN reported. Hamas said it was reviewing the Witkoff proposal. That proposal included the release of 10 living hostages and 18 deceased hostages, as well as a 60-day truce. Israeli Prime Minister Benjamin Netanyahu told hostage families that he had accepted Witkoff's proposal.

Canterbury school sells 10,000 blocks of butter in fundraiser
Canterbury school sells 10,000 blocks of butter in fundraiser

1News

time2 days ago

  • 1News

Canterbury school sells 10,000 blocks of butter in fundraiser

A primary school in Canterbury has turned to the buttery bullion instead of fundraising favourites such as chocolate or cookies. Leithfield School Te Kura o Kowai, a primary school north of Christchurch has been selling 250 gram blocks of butter for $4. It's a bargain compared to some supermarket butter blocks that are more than $10 for 500 grams, depending on the brand. The school's principal Rob Cavanagh told RNZ the interest in the butter had been overwhelming over the past few weeks. "Our fundraising team thought it was going to be a bit of a small earner, maybe bring in a few a few dollars and sell a few 100 blocks of butter. But we got that one completely wrong and it's been super popular." ADVERTISEMENT He said it started after a parent in the school's fundraising team came across the Westland dairy fundraising page. "On there was just an opportunity to sell some butter and they thought, 'hey, let's give it a go and hopefully we'll sell a few blocks and bring in a little bit of money'." In total, the school has sold more than 10,000 blocks of butter. "It's turned into what we thought would be a minor operation into a rather large-scale logistical operation." Interest has come from as far as Hawke's Bay and the Bay of Plenty, from comments on their Facebook page. "[It's] well and truly out of the reach of our small team of volunteers in terms of the distribution here from school. It is a local thing for us, and we're pleased to know that there are lots of people in our local area that are taking up the opportunity and able to give a bit back to the school at the same time." From each block of butter sold, the school makes a dollar. The funds go into different aspects of the school, including subsidising some start of the year costs for families, he said. ADVERTISEMENT "We're bringing our stationery costs right down at the start of the year [and] we're able to help with the shortfall in costs for school camps. All of our camps happen in term 1 and we always have a bit of a shortfall when we come to taking the money from donations that come in and the board's operation funding. "We're purchasing new Kapa Haka uniforms for our senior Kapa haka group. We're sending some of our senior students on leadership opportunities and we're buying some resources for our new writing programme we're using this year as well." The school was selling butter until 5pm on May 30.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store