{"id":13458,"date":"2023-05-03T14:36:28","date_gmt":"2023-05-03T14:36:28","guid":{"rendered":"http:\/\/scannn.com\/how-we-protect-businesses-from-malware\/"},"modified":"2023-05-03T14:36:28","modified_gmt":"2023-05-03T14:36:28","slug":"how-we-protect-businesses-from-malware","status":"publish","type":"post","link":"https:\/\/scannn.com\/lv\/how-we-protect-businesses-from-malware\/","title":{"rendered":"How We Protect Businesses From Malware"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><span style=\"font-weight: 400\">Today, as part of our <a href=\"https:\/\/about.fb.com\/news\/2023\/05\/metas-q1-2023-security-reports\/\">quarterly threat reporting<\/a>, we\u2019re sharing updates on how our security, integrity and support teams help protect businesses against malware \u2014 one of the most prevalent threats across the internet. This includes a behind-the-scenes look at how we tackle this challenge from multiple angles at once: malware analysis and threat disruption, product updates, community support and education, information sharing with other companies and holding threat actors accountable.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Last year, we <\/span><a href=\"https:\/\/about.fb.com\/news\/2022\/10\/protecting-people-from-malicious-account-compromise-apps\/\"><span style=\"font-weight: 400\">shared<\/span><\/a><span style=\"font-weight: 400\"> our insights into <\/span><span style=\"font-weight: 400\">malicious mobile apps that indiscriminately target the general public and were available in official app stores. Today, we\u2019re publishing detailed findings into aggressive and persistent strains of<\/span> <span style=\"font-weight: 400\">malware targeting business accounts online.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Because these malicious groups are financially motivated, we expect them to continue probing defenses by diversifying their operations to spread across the internet so they can withstand disruptions by any one company \u2014 ours included. That\u2019s why we\u2019re sharing our findings, tips and threat indicators so that the defender community and people using our services can take steps to stay safe.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400\">What We\u2019ve Found<\/span><\/h2>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Our security researchers track and take action against hundreds of threat actors around the world. This year alone, we\u2019ve detected and disrupted nearly ten new malware strains, including those posing as ChatGPT browser extensions and productivity tools, the latest iterations of malware known in the security community as Ducktail, and previously unreported malware families including one we call NodeStealer. Read <a href=\"https:\/\/engineering.fb.com\/2023\/05\/03\/security\/malware-nodestealer-ducktail\/\">our technical threat research<\/a>.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">These malware families target people through email phishing, malicious browser extensions, ads and mobile apps, and various social media platforms with an aim to run unauthorized ads from the compromised business accounts across the internet.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">We\u2019ve identified these malware operations at different stages of their lifecycle and have already seen rapid adversarial adaptation in response to our detection, including some of them choosing to shift their initial targeting elsewhere on the internet.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">As part of our most recent work to protect people and businesses from malicious targeting using ChatGPT as a lure, since March 2023 we\u2019ve <\/span><b>blocked and shared with our industry peers more than 1,000 malicious links from being shared across our technologies<\/b><span style=\"font-weight: 400\"> and reported a number of browser extensions and mobile apps to our peer companies. With each threat investigation, we\u2019ve continued to strengthen how we detect and block these types of malware threats at scale.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">As part of our work against Ducktail malware, we also issued a cease and desist letter to individuals behind it in Vietnam, referred to law enforcement, and will consider all appropriate additional enforcement options against malicious actors behind targeting people on our services.\u00a0<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400\">How Does Business-Targeting Malware Work?<\/span><\/h2>\n<p><span style=\"font-weight: 400\">Threat actors go through many stages to target businesses with malware \u2014 from developing or acquiring malicious software, to hosting it somewhere online, to spreading and delivering it to targets, and hiding it to evade detection by companies like ours. This complexity makes the threat of business-targeting malware an ecosystem challenge, requiring a concerted effort to combat these malicious operations across our entire industry.<\/span><\/p>\n<p><span style=\"font-weight: 400\">While attack scenarios may vary, threat actors typically disguise malware within innocuous-looking files, as well as mobile apps or browser extensions available in official app stores. Like spammers, they latch onto popular topics like political news or the latest tech or business productivity tools\u00a0 to hide their malware and trick people into clicking on or downloading it.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">For example, one of the campaigns we recently disrupted leveraged people\u2019s interest in\u00a0 Open AI\u2019s ChatGPT to lure them into installing malware. In response to detection by our security teams and also our industry peers, we\u2019ve seen bad actors quickly pivot to other themes, including posing as Google Bard, TikTok marketing tools, pirated software and movies, and Windows utilities.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">To target businesses, malicious groups often first go after the personal accounts of people who manage or are connected to business pages and advertising accounts. Threat actors may design their malware to target a particular online platform, including<\/span><span style=\"font-weight: 400\"> building in more sophisticated forms of account compromise than what you\u2019d typically expect from run-of-the-mill malware.<\/span><\/p>\n<p><span style=\"font-weight: 400\">For example, we\u2019ve seen malware families that can attempt to evade two-factor authentication or have the ability to automatically scan for and detect connections between the compromised account and business accounts it might be linked to. <\/span><span style=\"font-weight: 400\">See more details in <a href=\"https:\/\/engineering.fb.com\/2023\/05\/03\/security\/malware-nodestealer-ducktail\/\">our technical threat research<\/a>.<\/span><\/p>\n<p><a href=\"https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/343326322_573465388220286_4644304410175070908_n.png?resize=960%2C839\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full wp-image-38276\" src=\"https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/343326322_573465388220286_4644304410175070908_n.png?resize=960%2C839\" alt=\"An image of a Google Chrome extension disguised as having ChatGPT functionality.\" width=\"960\" height=\"839\" srcset=\"https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/343326322_573465388220286_4644304410175070908_n.png?resize=960%2C839?w=1600 1600w, https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/343326322_573465388220286_4644304410175070908_n.png?resize=960%2C839?w=300 300w, https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/343326322_573465388220286_4644304410175070908_n.png?resize=960%2C839?w=768 768w, https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/343326322_573465388220286_4644304410175070908_n.png?resize=960%2C839?w=1024 1024w, https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/343326322_573465388220286_4644304410175070908_n.png?resize=960%2C839?w=1536 1536w, https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/343326322_573465388220286_4644304410175070908_n.png?resize=960%2C839?w=1235 1235w, https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/343326322_573465388220286_4644304410175070908_n.png?resize=960%2C839?w=686 686w\" sizes=\"(max-width: 960px) 100vw, 960px\" data-recalc-dims=\"1\"\/><\/a><\/p>\n<p><a href=\"https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/342885832_245646921327528_1192466390666101491_n.png?resize=960%2C769\"><img loading=\"lazy\" decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-38275\" src=\"https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/342885832_245646921327528_1192466390666101491_n.png?resize=960%2C769\" alt=\"An image of a Google Chrome extension disguised as having ChatGPT functionality.\" width=\"960\" height=\"769\" srcset=\"https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/342885832_245646921327528_1192466390666101491_n.png?resize=960%2C769?w=1600 1600w, https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/342885832_245646921327528_1192466390666101491_n.png?resize=960%2C769?w=300 300w, https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/342885832_245646921327528_1192466390666101491_n.png?resize=960%2C769?w=768 768w, https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/342885832_245646921327528_1192466390666101491_n.png?resize=960%2C769?w=1024 1024w, https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/342885832_245646921327528_1192466390666101491_n.png?resize=960%2C769?w=1536 1536w, https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/342885832_245646921327528_1192466390666101491_n.png?resize=960%2C769?w=1348 1348w, https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/342885832_245646921327528_1192466390666101491_n.png?resize=960%2C769?w=749 749w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" data-recalc-dims=\"1\"\/><\/a><\/p>\n<h2><span style=\"font-weight: 400\">Product and Support Updates<\/span><\/h2>\n<p><span style=\"font-weight: 400\">To help businesses stay safe across their Meta accounts, we\u2019re continuing to roll out protections against malicious activity:<\/span><\/p>\n<ul>\n<li><b>New malware removal support: <\/b><span style=\"font-weight: 400\">Malware can be designed to re-compromise accounts even after they\u2019ve been recovered by their rightful owners. This leads to a continuous cycle of compromise and recovery that can only be fully resolved when the malware is removed by the user. To help businesses that may have unknowingly self-compromised their devices, we\u2019re launching a new support tool that guides people step-by-step through how to identify and remove malware, including using third-party antivirus tools. Because compromise often occurs outside of our apps and technologies, these stand-alone tools are a critical step in the recovery cycle to help business accounts stay safe.<\/span><\/li>\n<\/ul>\n<p><a href=\"https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/03_Protect-your-account-1.gif?resize=960%2C659\"><img loading=\"lazy\" decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-38263 size-full\" src=\"https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/03_Protect-your-account-1.gif?resize=960%2C659\" alt=\"\" width=\"960\" height=\"659\" data-recalc-dims=\"1\"\/><\/a><\/p>\n<ul>\n<li><b>Verifying connected Business Manager accounts:<\/b><span style=\"font-weight: 400\"> We often see threat actors attempt to use compromised accounts to add themselves as business admins to connected business Pages. To help protect against this, we\u2019ve rolled out an ability for businesses to have more visibility and control over administrator changes in Business Manager. For example, businesses can now create restrictions to only allow admins from trusted, selected domains and more effectively audit people\u2019s access through a new active or inactive <\/span><a href=\"https:\/\/www.facebook.com\/business\/help\/996373447409365?locale=en_US\"><span style=\"font-weight: 400\">status filter<\/span><\/a><span style=\"font-weight: 400\"> to assess the status of admins.<\/span><\/li>\n<li><b>Increasing protections for sensitive account actions: <\/b><span style=\"font-weight: 400\">We are expanding authorization requirements for sensitive business account actions like accessing a credit line or changing business administrators. To complete the change, businesses will be prompted to authenticate with two-factor authentication, email verification or co-worker approval. They can also select a trusted employee that is not an administrator to approve sensitive actions.<\/span><\/li>\n<li><b>Introducing Meta Work accounts: <\/b><span style=\"font-weight: 400\">Later this year, we will begin rolling out Meta Work accounts to allow business users to log in and operate Business Manager without requiring a personal account. This will help keep business accounts more secure in cases when attackers begin with a personal account compromise. We plan to test work accounts with a limited set of advertisers this year and aim to expand availability over time. Once work accounts become available, organizations can manage them on behalf of their employees and have access to administrative features including single sign-on, automated account provisioning and more.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400\">How to Know If Your Device is Affected<\/span><\/h2>\n<p><span style=\"font-weight: 400\">If you identify unusual behavior on your device or online accounts, it might be a sign that you may have inadvertently downloaded malware. Here are some telltale signs to look out for:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Suspicious activity on your online accounts that you did not authorize, including financial charges\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Your device runs significantly slower or is frequently freezing<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">New toolbars, icons or tabs appear in your browser that you don\u2019t recognize<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Scammy pop-ups appear in your browser<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Shorter device battery life<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400\">What to Do If Your Device is Affected<\/span><\/h2>\n<p><span style=\"font-weight: 400\">If you believe you\u2019ve downloaded malicious software, we recommend that you delete it from your device immediately, scan your device with up-to-date antivirus software and follow these instructions to secure your personal and business accounts:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\"><a href=\"https:\/\/www.facebook.com\/help\/773912954219636\">Leverage anti-virus software<\/a>: We recommend that people who have access to online business tools like Meta Business Manager install and use antivirus software. Since new malware is created all the time, we encourage you to keep your antivirus tools up to date and enable automatic scanning of files in your antivirus software.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/www.facebook.com\/help\/148233965247823?helpref=faq_content\"><span style=\"font-weight: 400\">Enable two-factor authentication<\/span><\/a><span style=\"font-weight: 400\"> to add an extra security layer to your account. Two-factor authentication is one of the most effective tools for combating account compromise attempts.<\/span><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/www.facebook.com\/help\/213395615347144?helpref=faq_content\"><span style=\"font-weight: 400\">Reset your password.<\/span><\/a><span style=\"font-weight: 400\"> Never reuse your password across multiple websites.<\/span><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/www.facebook.com\/help\/162968940433354?helpref=faq_content\"><span style=\"font-weight: 400\">Turn on log-in alerts<\/span><\/a><span style=\"font-weight: 400\"> so you\u2019re notified if someone is trying to access your account, and r<\/span><span style=\"font-weight: 400\">eview your previous sessions to be sure you recognize which devices have access to your account.<\/span><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/www.facebook.com\/business\/help\/486960815135452\"><span style=\"font-weight: 400\">Enable business notifications<\/span><\/a><span style=\"font-weight: 400\"> so you\u2019re alerted of any changes to your Meta Business Manager account.<\/span><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/www.facebook.com\/help\/799880743466869?helpref=faq_content\">Use the Security Checkup Tool<\/a> to help secure your account.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/342216513_3511043245838814_9010440730080823404_n.png?resize=960%2C540\"><img loading=\"lazy\" decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-38255\" src=\"https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/342216513_3511043245838814_9010440730080823404_n.png?resize=960%2C540\" alt=\"An infographic showing best practices for keeping your Business Manager account secure.\" width=\"960\" height=\"540\" srcset=\"https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/342216513_3511043245838814_9010440730080823404_n.png?resize=960%2C540?w=1920 1920w, https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/342216513_3511043245838814_9010440730080823404_n.png?resize=960%2C540?w=300 300w, https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/342216513_3511043245838814_9010440730080823404_n.png?resize=960%2C540?w=768 768w, https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/342216513_3511043245838814_9010440730080823404_n.png?resize=960%2C540?w=1024 1024w, https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/342216513_3511043245838814_9010440730080823404_n.png?resize=960%2C540?w=1536 1536w, https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/342216513_3511043245838814_9010440730080823404_n.png?resize=960%2C540?w=800 800w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" data-recalc-dims=\"1\"\/><\/a><\/p>\n<\/p><\/div>\n<p><script async defer crossorigin=\"anonymous\" src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&#038;version=v5.0\"><\/script><br \/>\n<br \/><br \/>\n<br \/><a href=\"https:\/\/about.fb.com\/news\/2023\/05\/how-meta-protects-businesses-from-malware\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, as part of our quarterly threat reporting, we\u2019re sharing updates on how our security, integrity and support teams help protect businesses against malware \u2014 one of the most prevalent threats across the internet. This includes a behind-the-scenes look at how we tackle this challenge from multiple angles at once: malware analysis and threat disruption, [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":13459,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[123],"tags":[],"class_list":["post-13458","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-facebook"],"_links":{"self":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/posts\/13458","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/comments?post=13458"}],"version-history":[{"count":0,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/posts\/13458\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/media\/13459"}],"wp:attachment":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/media?parent=13458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/categories?post=13458"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/tags?post=13458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}