
A clickjack Trojan campaign targets Facebook users to advertise adult websites. This malicious operation manipulates unsuspecting visitors into unknowingly ‘liking’ Facebook posts, primarily promoting explicit content, while exploiting vulnerabilities in malicious SVG files. Â
The campaign operates via deceptive links on adult-themed websites, often hosted on blogspot.com domains, a recent Malwarebytes cybersecurity investigation has uncovered.
Visitors to these sites may encounter Scalable Vector Graphics (SVG) files, which appear harmless but are embedded with obfuscated JavaScript code, and are downloaded in some cases.Â
Once downloaded, the SVG file executes additional malicious scripts from the domain crhammerstein[.]de, which was blocked by Malwarebytes.Â
JSFuck obfuscation, a JavaScript encoding method limited to six characters, is employed to conceal the script’s intentions. Combined with hybrid techniques, this significantly complicates detection and analysis. Â
The Trojan.JS.Likejack, as identified by researchers, carries out unauthorized ‘likes’ on Facebook posts tied to the campaign’s content.Â
For this exploit to succeed, users need to be logged into their accounts. The higher engagement these fraudulent likes generate increases the visibility of the posts, driving traffic and deepening the campaign’s reach.
This Trojan campaign poses significant cybersecurity threats, including privacy risks and potential financial exploitation. To mitigate risks, experts recommend avoiding dubious links, disabling automatic downloads in web browsers, and employing real-time malware protection tools.Â
By staying vigilant and using robust cybersecurity solutions, users can defend against evolving threats like the clickjack Trojan, which continue to exploit digital platforms for malicious gain.Â
In January, TechNadu reported on a novel ‘DoubleClickjacking’ attack aimed at website compromise and account takeover.