Kaspersky warns of a new credential-stealing campaign via Facebook

As part of this attack, Facebook users receive messages containing a link disguised as a notification that their account has been blocked


By: | on | 177 views
Topic: News


Kaspersky warns of a new credential-stealing campaign via Facebook

Business

Since late August 2025, the Kaspersky Global Research and Analysis Team (GReAT) (www.Kaspersky.co.za) has been observing a new malicious campaign leveraging a stealer — a type of malware designed to steal passwords and other account information. The StealC v2 infostealer is being spread through Facebook messages. More than 400 incidents have been identified to date, targeting users across multiple countries, including confirmed cases in Kenya, Angola, Ethiopia, Niger, Uganda and Zambia, among other African* countries.

As part of this attack, Facebook users receive messages containing a link disguised as a notification that their account has been blocked.

Clicking the link opens a fake support page claiming that the user’s account has been blocked due to suspicious activity. To “restore access,” users are prompted to use the “Appeal” button, which initiates the download of a malicious script that installs the StealC v2, a dangerous malware offered under a Malware-as-a-Service model, on the victim’s device. The malware itself steals passwords, cookies, screenshots, as well as cryptocurrency wallet data.

“Cybercriminals often exploit users’ fear of losing account access and a perceived sense of urgency. This pressure can lead individuals to act without caution, increasing the risk of infection by malware such as StealC v2. Users should remain vigilant and always verify the authenticity of messages before clicking any links,” comments Marc Rivero, lead security researcher at Kaspersky's Global Research and Analysis Team.

StealC v2, first observed in 2025, significantly enhances the malware’s capabilities and elevates the risk to both individual and corporate users. The original StealC, which emerged in 2023 on dark web platforms, quickly became a sought-after tool among cybercriminals thanks to its accessibility, capabilities and ease of access.

To be protected from phishing, Kaspersky recommends corporate and individual users:

  • Practice caution when clicking links. Sometimes emails and websites look just like real ones. It depends on how well the criminals did their homework. But the hyperlinks, most likely, will be incorrect, with spelling mistakes, or they can redirect you to a different place.
  • Look out for urgency or threats. Phishing attempts frequently try to create a sense of urgency or fear. Be cautious of emails demanding immediate action, such as changing a password or providing personal information.
  • Verify unsolicited messages, calls, or links, even if they appear legitimate. Never share 2FA codes.
  • Use Kaspersky Next (https://apo-opa.co/42lrs13) (in corporate environments) or Kaspersky Premium (https://apo-opa.co/4nr4ga5) (for individual use) to block phishing attempts.

Reference:

* Kaspersky identified confirmed cases of the StealC v2 infostealer in Africa in Angola, Benin, Burkina Faso, Chad, Egypt, Ethiopia, Gabon, Kenya, Libya, Madagascar, Mali, Morocco, Mozambique, Niger, Tunisia, Uganda, Zaire, Zambia. There were also confirmed cases in other regions of the world.

Distributed by APO Group on behalf of Kaspersky.

Copyright: Fresh Angle International (www.freshangleng.com)
ISSN 2354 - 4104


Sponsored Ad




Our strategic editorial policy of promoting journalism, anchored on the tripod of originality, speed and efficiency, would be further enhanced with your financial support. Your kind contribution, to our desire to become a big global brand, should be credited to our account:

Fresh Angle Nig. Ltd
ACCOUNT NUMBER: 0130931842.
BANK GTB.



Sponsored
Sponsored Ads