The **FileFix attack** impersonated a **Facebook security alert**, tricking users into executing malicious commands disguised as a PDF file appeal process. Victims unknowingly ran a **multi-stage payload** that dropped the **StealC infostealer**, a malware capable of harvesting credentials from **browsers (Chrome, Firefox, Opera, etc.)**, **cryptocurrency wallets (20+ types)**, **messaging apps (Telegram, Discord, Thunderbird)**, **VPNs (OpenVPN, Proton VPN)**, **cloud services (AWS, Azure)**, and **gaming platforms (Ubisoft, Battle.net)**. The attack leveraged **AI-generated decoy images** (e.g., houses, doors) embedded with **PowerShell scripts** and encrypted executables, evading detection by mimicking benign user actions (downloading a JPG). The malware also checked for **virtual machines (VMs)** to avoid sandbox analysis. While the article does not confirm **direct financial losses or data breaches** at Facebook, the campaign’s **global reach** (US, Germany, China, etc.) and **sophisticated evasion techniques** suggest **high-risk exposure** for users’ **personal, financial, and corporate credentials**. The attack’s **rapid evolution** (from a July 2023 PoC to a **517% surge in 6 months**) highlights its effectiveness in bypassing traditional phishing defenses, posing **reputational harm** to Facebook’s platform security and **potential downstream fraud** for affected users.
Source: https://www.theregister.com/2025/09/16/filefix_attacks_facebook_security_alert/
TPRM report: https://www.rankiteo.com/company/facebook
"id": "fac4793447091625",
"linkid": "facebook",
"type": "Cyber Attack",
"date": "7/2023",
"severity": "60",
"impact": "2",
"explanation": "Attack limited on finance or reputation"
{'affected_entities': [{'customers_affected': 'Users Worldwide (US, '
'Bangladesh, Philippines, '
'Tunisia, Nepal, Dominican '
'Republic, Serbia, Peru, China, '
'Germany, etc.)',
'industry': 'Technology',
'location': 'Global',
'name': 'Facebook (Brand Abused)',
'type': 'Social Media Platform'},
{'location': 'Global (Multi-Country)',
'name': 'Individual Victims',
'type': 'End Users'}],
'attack_vector': ['Fake Facebook Security Alert',
'User-Executed Command via File Explorer',
'AI-Generated Image Payloads',
'PowerShell Script Embedding'],
'customer_advisories': ['Acronis Blog/Report (Expected)',
'Potential Facebook Security Notices'],
'data_breach': {'data_encryption': 'Partial (Payload Encrypted in Images)',
'data_exfiltration': 'Likely (StealC Capabilities)',
'file_types_exposed': ['JPG (Malicious Images)',
'PowerShell Scripts',
'Executables'],
'personally_identifiable_information': 'Potential (Browser '
'Autofill, Saved '
'Logins)',
'sensitivity_of_data': 'High',
'type_of_data_compromised': ['Credentials',
'Session Cookies',
'Cryptocurrency Wallet Data',
'Messaging App Data',
'VPN Configurations',
'Cloud Service Keys',
'PII (Potential)']},
'date_detected': '2024-08-late',
'date_publicly_disclosed': '2024-08-late',
'description': 'An attack called FileFix masquerades as a Facebook security '
'alert, tricking victims into executing malicious commands '
'that ultimately drop the StealC infostealer and malware '
'downloader. The attack is a variation of ClickFix, a '
'social-engineering technique that surged by 517% in the past '
'six months. Victims are deceived into copying and pasting a '
'command into a file upload window or File Explorer, which '
'executes the payload. The attack uses AI-generated images '
'(e.g., a bucolic house, intricate doors) embedded with '
'PowerShell scripts and encrypted executables to evade '
'detection. The final payload includes a Go-written loader '
'that checks for VM environments before deploying StealC v2, '
'which targets browsers, cryptocurrency wallets, messaging '
'apps, VPNs, and cloud service credentials (Azure, AWS). The '
'campaign has global reach, with submissions from multiple '
'countries, and leverages BitBucket for hosting malicious '
'images to avoid domain-based detection.',
'impact': {'brand_reputation_impact': 'Potential Reputation Damage for '
'Facebook (Abused Brand Trust)',
'data_compromised': ['Browser Credentials',
'Cryptocurrency Wallet Data',
'Messaging App Data (Telegram, Discord, etc.)',
'VPN Credentials',
'Cloud Service Keys (Azure, AWS)',
'Game Launcher Credentials'],
'identity_theft_risk': 'High (Stolen PII, Credentials, Financial '
'Data)',
'payment_information_risk': 'High (Cryptocurrency Wallets, Payment '
'App Data)',
'systems_affected': ['Windows (User Devices)',
'Potential Enterprise Systems via Stolen '
'Credentials']},
'initial_access_broker': {'backdoors_established': "Potential (StealC's "
'Secondary Payload '
'Capabilities)',
'data_sold_on_dark_web': 'Likely (Stolen '
'Credentials/Wallet Data)',
'entry_point': ['Fake Facebook Security Alert PDF',
'User-Executed Command in File '
'Explorer'],
'high_value_targets': ['Cryptocurrency Wallets',
'Cloud Service Credentials',
'Enterprise VPN Access']},
'investigation_status': 'Ongoing (Active Campaign)',
'lessons_learned': ['Evolution of social engineering tactics beyond '
'traditional phishing (e.g., user-executed commands via '
'fake file prompts).',
'Effectiveness of AI-generated imagery in evading '
'detection and luring victims.',
'Rapid weaponization of proof-of-concept (PoC) attacks '
'(75 days from PoC to global campaign).',
'Need for updated anti-phishing training to address '
"'Fix'-type attacks (ClickFix/FileFix).",
'Shift from malicious domains to legitimate platforms '
'(e.g., BitBucket) for payload hosting.'],
'motivation': ['Data Theft',
'Credential Harvesting',
'Financial Gain (Potential Ransomware/Fraud)'],
'post_incident_analysis': {'root_causes': ['Lack of user awareness about '
"'Fix'-type social engineering.",
'Over-reliance on domain '
'reputation for detection '
'(attackers used BitBucket).',
'Effective evasion via image '
'steganography and AI-generated '
'lures.',
'Rapid iteration of attack '
'infrastructure (new variants '
'deployed frequently).']},
'recommendations': ["Educate users on 'Fix'-style attacks (e.g., fake "
'CAPTCHAs, file upload prompts).',
'Monitor for unusual PowerShell activity originating from '
'image files.',
'Block execution of scripts from temporary directories '
'(e.g., %Temp%).',
'Implement behavioral detection for malware using image '
'steganography.',
'Enhance email/phishing filters to detect fake social '
'media alerts.',
'Restrict access to file-sharing platforms (e.g., '
'BitBucket) for untrusted sources.',
'Deploy endpoint detection for StealC indicators (e.g., '
'targeted app data exfiltration).'],
'references': [{'source': 'The Register'},
{'source': 'Acronis Threat Research Report'},
{'source': 'ESET Research (ClickFix/FileFix Surge Data)'},
{'source': 'VirusTotal Submissions',
'url': 'https://www.virustotal.com'}],
'response': {'communication_strategy': ['Public Disclosure via The Register',
'Research Report by Acronis'],
'third_party_assistance': ['Acronis Threat Research Unit']},
'title': 'FileFix Attack Dropping StealC Infostealer via Fake Facebook '
'Security Alerts',
'type': ['Malware', 'Social Engineering', 'Infostealer', 'Phishing'],
'vulnerability_exploited': 'Human Trust (Social Engineering)'}