Facebook Token Hijacker
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Ranking: | 3,837 |
Threat Level: | 10 % (Normal) |
Infected Computers: | 756 |
First Seen: | February 8, 2013 |
Last Seen: | September 19, 2023 |
OS(es) Affected: | Windows |
Facebook Token Hijacker is a malware infection that posts messages on its victim's Facebook walls and creates events designed to attract the victim's Facebook friends in order to spread from one computer to another. Facebook Token Hijacker will send out invites to the victim's Facebook friends in order to spread additional malware. There are several variants of Facebook Token Hijacker, all spread on social networks through several kinds of social engineering techniques. The Facebook Token Hijacker version that has captured the attention of malware researchers uses an advertisement that promises a free pair of UGG boots to its victims. The reason why this version of Facebook Token Hijacker has attracted attention from malware analysts is that Facebook Token Hijacker has obfuscation techniques that have allowed Facebook Token Hijacker to circumvent current anti-malware measures.
Even though Facebook Token Hijacker uses sophisticated obfuscation techniques, Facebook Token Hijacker still requires the victims themselves in order to spread from one computer to another. To do this, Facebook Token Hijacker posts advertisements for free UGG boots. When a computer user clicks on this fake 'special offer', the computer user is required to enter their access token in order to access the Facebook application. Using this information, Facebook Token Hijacker then takes over the victim's Facebook account and uses it to spread by displaying additional advertisements on the victim's Facebook wall. As part of its attack, Facebook Token Hijacker will create a performance and bring on all of the victim's friends.
How Facebook Token Hijacker Differs from Conventional Social Network Phishing Attacks
Conventional social network phishing attacks have traditionally had trouble circumventing Facebook's Identity and Access Management Controls. While they save the victim's login information in order to use it later, a lot of times they will not be capable of accessing the victim's account due to the lack of an access token. However, Facebook Token Hijacker goes straight for the access token, allowing criminals to continue spreading this malware infection from one computer immediately after an infection. It is important to note that the goal of Facebook Token Hijacker is not to monetize from UGG advertisements or these kinds of scams, but to obtain computer users' Facebook credentials in order to spread from one computer to another. By casting a wide net, criminals can then combine these attacks with other malware and known scams in order to spread other, more destructive malware.
URLs
Facebook Token Hijacker may call the following URLs:
https://www.powerofsearches.com |
https://www.togosearching.com/webs?src= |
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.