Facebook Shuts Down Accounts Being Used by Two Hacker Groups
Table of Contents
- By Dawna M. Roberts
- Dec 16, 2020
Last week ThreatPost reported that Facebook identified and shut down various accounts and pages used by scammers to infect users with malware and conduct fraud through phishing campaigns.
What Happened?
Facebook identified one of the hacker groups as APT32 from Vietnam, and the other is an unnamed group in Bangladesh. Each hacker gang used distinctly different tactics and abused various Facebook resources to target different types of users. Both groups acted independently and were unaware of the other. Facebook has removed the users and their ability to use any part of its platform. Some of the threat actors were using Facebook features to hack other accounts.
In a blog post from Facebook last Thursday, Nathaniel Gleicher, Head of Security Police, and Mike Dvilyanski, Cyber Threat Intelligence Manager said this “The operation from Vietnam focused primarily on spreading malware to its targets, whereas the operation from Bangladesh focused on compromising accounts across platforms and coordinating reporting to get targeted accounts and Pages removed from Facebook.”
Who is APT32?
Threat researchers are aware of a group called APT32, aka OceanLotus from Vietnam. They are an advanced persistent threat (APT) that started their operations in 2013. For the past couple of years, this group has been linked to numerous attacks using multi-stage payloads and advanced anti-detection tactics. In the report released by Facebook, they explained that the group was using Facebook to target “Vietnamese human rights activists locally and abroad, various foreign governments including those in Laos and Cambodia, non-governmental organizations, news agencies and a number of businesses across information technology, hospitality, agriculture and commodities, hospitals, retail, the auto industry, and mobile services with malware. Our investigation linked this activity to CyberOne Group, an IT company in Vietnam (also known as CyberOne Security, CyberOne Technologies, Hành Tinh Company Limited, Planet, and Diacauso).” They also listed some of the notable techniques used by this group:
"Social engineering: APT32 created fictitious personas across the internet posing as activists and business entities or used romantic lures when contacting people they targeted. These efforts often involved creating backstops for these fake personas and fake organizations on other internet services so they appear more legitimate and can withstand scrutiny, including by security researchers. Some of their Pages were designed to lure particular followers for later phishing and malware targeting.
Malicious Play Store apps: In addition to using Pages, APT32 lured targets to download Android applications through Google Play Store that had a wide range of permissions to allow broad surveillance of peoples’ devices.
Malware propagation: APT32 compromised websites and created their own to include obfuscated malicious javascript as part of their watering hole attack to track targets’ browser information. A watering hole attack is when hackers infect websites frequently visited by intended targets to compromise their devices. As part of this, the group built custom malware capable of detecting the type of operating system a target uses (Windows or Mac) before sending a tailored payload that executes the malicious code. Consistent with this group’s past activity, APT32 also used links to file-sharing services where they hosted malicious files for targets to click and download. Most recently, they used shortened links to deliver malware. Finally, the group relied on the Dynamic-Link Library (DLL) side-loading attacks in Microsoft Windows applications. They developed malicious files in exe, rar, rtf, and iso formats, and delivered benign Word documents containing malicious links in text.”
What Do We Know About the Bangladesh Group?
Additionally, Facebook intelligence police found that the group operating out of Bangladesh “targeted local activists, journalists and religious minorities, including those living abroad, to compromise their accounts and have some of them disabled by Facebook for violating our Community Standards. Our investigation linked this activity to two non-profit organizations in Bangladesh: Don’s Team (also known as Defense of Nation) and the Crime Research and Analysis Foundation (CRAF). They appeared to be operating across a number of internet services.”
They elaborated with “Don’s Team and CRAF collaborated to report people on Facebook for fictitious violations of our Community Standards, including alleged impersonation, intellectual property infringements, nudity, and terrorism. They also hacked people’s accounts and Pages and used some of these compromised accounts for their own operational purposes, including to amplify their content. On at least one occasion, after a Page admin’s account was compromised, they removed the remaining admins to take over and disable the Page. Our investigation suggests that these targeted hacking attempts were likely carried out through a number of off-platform tactics, including email and device compromise and abuse of our account recovery process.”
Along with removing all avenues of access for the perpetrators, Facebook shared the information with “industry partners” to help detect similar activity and take evasive action when discovering suspicious activity on other platforms.