الرئيسية OSINT أخبار Signals
CYBER

Facebook ads spread fake Windows 11 downloads that steal passwords and crypto wallets

🕓 1 دقيقة قراءة

A sophisticated new campaign is using Facebook ads to distribute fake Windows 11 installers designed to steal passwords and drain cryptocurrency wallets. The ads mimic official Microsoft promotions, urging users to upgrade to the latest version. This **phishing** tactic has proven highly effective, directing traffic to convincing replica download pages.

These fraudulent sites are near-perfect clones of Microsoft’s official Software Download portal. The only clear red flag is the URL, which uses deceptive domains incorporating version numbers like “25H2” to appear legitimate. This attention to detail helps the **exploit** bypass initial user suspicion.

The operation employs advanced evasion techniques. Before serving any payload, the site performs checks to identify security researchers and automated systems. If a visitor connects from a data center IP, they are redirected away. Only genuine home users are presented with the malicious download, a method that has shielded the campaign from rapid detection.

Clicking “Download Now” fetches a file named ms-update32.exe, hosted on a compromised GitHub account to borrow the platform’s credibility. The 75MB file appears authentic but is, in fact, a potent piece of **malware**. Once executed, it operates silently in the background.

The primary goal is data theft. The installer hunts for saved browser passwords, active session cookies, and critical files related to **crypto** wallets. This stolen information provides direct access to online accounts and digital assets, turning a simple software download into a devastating **data breach**.

This incident underscores a critical **vulnerability** in digital advertising ecosystems, where paid ads can weaponize trusted platforms. The attackers even use Facebook’s own tracking tools to monitor victim engagement and optimize their malicious ad spend, demonstrating a professional-grade approach to cybercrime.

For users, vigilance is key. Always obtain software directly from vendor websites. Enable multi-factor authentication and consider using a hardware wallet for **blockchain security** to protect digital assets. This campaign is a stark reminder that **ransomware** is not the only threat; silent data theft can be equally damaging.

Organizations must reinforce foundational **cybersecurity** hygiene. Employee training to recognize such scams is crucial, as these threats often bypass technical defenses by tricking people. The blend of social engineering and technical evasion makes this a persistent and dangerous threat to both personal and business **security**.

Telegram X LinkedIn
العودة للأخبار