{"id":50980,"date":"2023-03-08T15:39:26","date_gmt":"2023-03-08T15:39:26","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34397\/Info-Stealer-Targets-Facebook-Business-Accounts.html"},"modified":"2023-03-08T15:39:26","modified_gmt":"2023-03-08T15:39:26","slug":"info-stealer-targets-facebook-business-accounts","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/info-stealer-targets-facebook-business-accounts\/","title":{"rendered":"Info Stealer Targets Facebook Business Accounts"},"content":{"rendered":"<p>Malicious hackers have been using an advanced information stealer to target Facebook business accounts by using <a href=\"https:\/\/www.scmagazine.com\/news\/third-party-risk\/researchers-track-worrying-jump-in-malvertising-targeting-google-ads\" target=\"_blank\" rel=\"noreferrer noopener\">Google ads<\/a> and <a href=\"https:\/\/www.scmagazine.com\/analysis\/social-engineering\/meta-confirms-us-military-tied-to-fake-social-media-accounts-in-influence-campaign\" target=\"_blank\" rel=\"noreferrer noopener\">fake Facebook profiles<\/a> that promote games, adult content, and cracked software to lure victims into downloading malicious files.<\/p>\n<p>In a March 7 <a href=\"https:\/\/blog.morphisec.com\/sys01stealer-facebook-info-stealer\">blog post<\/a>, researchers at Morphisec said the attackers aim to steal sensitive information, including log-in data, cookies, and Facebook ad and business account information.&nbsp;The info stealer has been used in attacks against critical government infrastructure employees, manufacturing companies and other industries.<\/p>\n<p>The attackers lure&nbsp;a&nbsp;victim&nbsp;to&nbsp;click on a URL from a fake Facebook profile or advertisement to&nbsp;download a&nbsp;Zip&nbsp;file that&nbsp;purports to&nbsp;have&nbsp;an application, game or movie, but in reality executes PHP scripts responsible for stealing and exfiltrating information. The scripts are encoded using different techniques, which makes their analysis and detection harder.&nbsp;<\/p>\n<figure><img alt=\"A graphic depicting the infection chain of infostealing malware SYS101. (Source: Morphisec)\" srcset=\"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F03%2FScreenshot-2023-03-07-at-4.49.24-PM.png&amp;w=750&amp;q=75 1x, https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F03%2FScreenshot-2023-03-07-at-4.49.24-PM.png&amp;w=1920&amp;q=75 2x\" src=\"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F03%2FScreenshot-2023-03-07-at-4.49.24-PM.png&amp;w=1920&amp;q=75\" width=\"697\" height=\"418\" decoding=\"async\" data-nimg=\"1\" class=\"MediaItem_img__WJ8V4\" loading=\"lazy\"><figcaption>A graphic depicting the infection chain of infostealing malware SYS101. (Source: Morphisec)<\/figcaption><\/figure>\n<p>The research highlights how DLL side-loading attacks continue to serve as an effective pathway to trick Windows systems into loading malicious code. The problem could be alleviated if Microsoft enforced search orders for DLL by default, or if developers did it themselves. Often that is not the case.<\/p>\n<p>&#8220;Microsoft doesn\u2019t enforce search order for a range of reasons, such as enabling things like portability and backwards compatibility \u2014 for example, portable browser applications that use older Microsoft libraries. Security-minded developers may enforce search order within their code. But most developers aren&#8217;t security minded,&#8221; wrote Morphisec researcher Arnold Osipov. &#8220;This enables threat actors to position a malicious payload alongside a legitimate application. Then when an application loads in memory and search order is not enforced, the application loads the malicious file instead of the legitimate one, allowing threat actors to hijack legitimate, trusted, and even signed applications to load and execute malicious payloads.&#8221;<\/p>\n<p>The infostealer malware is usually delivered in two parts. First through a legitimate application that is executed when users click on a malicious link but which houses a malicious Dynamic Link Library that can be used to conduct side-loading attacks. That application in turn automatically runs an installer that decompresses a PHP application filled with scripts for stealing and exfiltrating data. Researchers have also seen the loader delivered through other methods, such as Rust and Python-coded commands.<\/p>\n<p>Osipov wrote that security teams can protect against the SYS01 stealer by limiting a user\u2019s rights to download and install programs, implementing other zero trust policies and training staff to avoid clicking on suspicious links.<\/p>\n<p>Simon Kenin, threat lab researcher at Deep Instinct, told SC Media the malware persists on infected computers and communicates with a command-and-control server that could deploy additional malware payloads or even ransomware. He noted that because malware continually evolves over time, this information stealer might add other capabilities that could pose a threat to additional enterprises over time.<\/p>\n<p>Morphisec researchers first began tracking the campaign in November 2022 and have named it \u201cSYS01 stealer.\u201d Another cybersecurity company, Zscaler, spotted the info stealer being used five months earlier in May 2022 in a similar campaign, stealing browser cookies and hijacking authenticated Facebook business accounts to pilfer user information. While that activity was <a href=\"https:\/\/www.scmagazine.com\/analysis\/identity-and-access\/ducktail-criminal-group-targets-facebook-business-with-malware-to-take-over-accounts\" target=\"_blank\" rel=\"noreferrer noopener\">initially attributed<\/a> to a financially-motivated threat group named Ducktails, researchers at WithSecure later <a href=\"https:\/\/labs.withsecure.com\/content\/dam\/labs\/docs\/WithSecure_Research_DUCKTAIL_Returns.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">disputed<\/a> those findings, saying there are no technical indicators and other intelligence indicating overlap between the two campaigns.<\/p>\n<p>John Anthony Smith, chief executive officer of the Conversant Group, added that threat actors are increasingly using ad content to lure users into clicking malicious links. He argued that security teams should view ad links the way they view users opening personal email services like Gmail or Hotmail on a corporate networks and develop similar security policies to compensate.<\/p>\n<p>&#8220;Ads, social network platforms, chat applications\/services, and any and all platforms that allow communication outside of the corporately sanctioned methods should be blocked,&#8221; Smith said.<\/p>\n<p>Mike Parkin, senior technical engineer at Vulcan Cyber, pointed out the original research identified this malware surfacing originally in 2021, and attributed it to a threat group in Vietnam \u2013 which was later corrected.&nbsp; This new research from Morphisec picks up that initial campaign from 2021 in May of 2022 and later November of the same year, showing that the threat actor is still active and development of their malware is ongoing.&nbsp;<\/p>\n<p>\u201cTaken as a whole, this highlights how threat actors evolve their tools and focus on specific targets over time.&nbsp;And how challenging it can be to firmly attribute specific malware strains to specific groups, when both the malware and groups that use it are constantly in flux,\u201d Parkin told SC Media.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34397\/Info-Stealer-Targets-Facebook-Business-Accounts.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8317],"class_list":["post-50980","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlinecybercrimefraudfacebooksocial"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Info Stealer Targets Facebook Business Accounts 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/info-stealer-targets-facebook-business-accounts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Info Stealer Targets Facebook Business Accounts 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/info-stealer-targets-facebook-business-accounts\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-08T15:39:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F03%2FScreenshot-2023-03-07-at-4.49.24-PM.png&amp;w=1920&amp;q=75\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/info-stealer-targets-facebook-business-accounts\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/info-stealer-targets-facebook-business-accounts\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Info Stealer Targets Facebook Business Accounts\",\"datePublished\":\"2023-03-08T15:39:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/info-stealer-targets-facebook-business-accounts\\\/\"},\"wordCount\":785,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/info-stealer-targets-facebook-business-accounts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.scmagazine.com\\\/_next\\\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F03%2FScreenshot-2023-03-07-at-4.49.24-PM.png&amp;w=1920&amp;q=75\",\"keywords\":[\"headline,cybercrime,fraud,facebook,social\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/info-stealer-targets-facebook-business-accounts\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/info-stealer-targets-facebook-business-accounts\\\/\",\"name\":\"Info Stealer Targets Facebook Business Accounts 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/info-stealer-targets-facebook-business-accounts\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/info-stealer-targets-facebook-business-accounts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.scmagazine.com\\\/_next\\\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F03%2FScreenshot-2023-03-07-at-4.49.24-PM.png&amp;w=1920&amp;q=75\",\"datePublished\":\"2023-03-08T15:39:26+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/info-stealer-targets-facebook-business-accounts\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/info-stealer-targets-facebook-business-accounts\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/info-stealer-targets-facebook-business-accounts\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.scmagazine.com\\\/_next\\\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F03%2FScreenshot-2023-03-07-at-4.49.24-PM.png&amp;w=1920&amp;q=75\",\"contentUrl\":\"https:\\\/\\\/www.scmagazine.com\\\/_next\\\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F03%2FScreenshot-2023-03-07-at-4.49.24-PM.png&amp;w=1920&amp;q=75\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/info-stealer-targets-facebook-business-accounts\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,cybercrime,fraud,facebook,social\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinecybercrimefraudfacebooksocial\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Info Stealer Targets Facebook Business Accounts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Info Stealer Targets Facebook Business Accounts 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/info-stealer-targets-facebook-business-accounts\/","og_locale":"en_US","og_type":"article","og_title":"Info Stealer Targets Facebook Business Accounts 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/info-stealer-targets-facebook-business-accounts\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-03-08T15:39:26+00:00","og_image":[{"url":"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F03%2FScreenshot-2023-03-07-at-4.49.24-PM.png&amp;w=1920&amp;q=75","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/info-stealer-targets-facebook-business-accounts\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/info-stealer-targets-facebook-business-accounts\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Info Stealer Targets Facebook Business Accounts","datePublished":"2023-03-08T15:39:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/info-stealer-targets-facebook-business-accounts\/"},"wordCount":785,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/info-stealer-targets-facebook-business-accounts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F03%2FScreenshot-2023-03-07-at-4.49.24-PM.png&amp;w=1920&amp;q=75","keywords":["headline,cybercrime,fraud,facebook,social"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/info-stealer-targets-facebook-business-accounts\/","url":"https:\/\/www.threatshub.org\/blog\/info-stealer-targets-facebook-business-accounts\/","name":"Info Stealer Targets Facebook Business Accounts 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/info-stealer-targets-facebook-business-accounts\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/info-stealer-targets-facebook-business-accounts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F03%2FScreenshot-2023-03-07-at-4.49.24-PM.png&amp;w=1920&amp;q=75","datePublished":"2023-03-08T15:39:26+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/info-stealer-targets-facebook-business-accounts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/info-stealer-targets-facebook-business-accounts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/info-stealer-targets-facebook-business-accounts\/#primaryimage","url":"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F03%2FScreenshot-2023-03-07-at-4.49.24-PM.png&amp;w=1920&amp;q=75","contentUrl":"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F03%2FScreenshot-2023-03-07-at-4.49.24-PM.png&amp;w=1920&amp;q=75"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/info-stealer-targets-facebook-business-accounts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,cybercrime,fraud,facebook,social","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinecybercrimefraudfacebooksocial\/"},{"@type":"ListItem","position":3,"name":"Info Stealer Targets Facebook Business Accounts"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=50980"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50980\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=50980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=50980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=50980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}