Emerging Threats

Meta ads posing as Adobe and Canva are spreading SYS01 stealer

Ray Fernandez

Oct 31, 20247 min read

Meta ads posing as Adobe and Canva are spreading SYS01 stealer (Header image)

BitDefender has uncovered a threat group using malvertising to distribute an information stealer known as SYS01. This development follows a trend that is becoming more popular every day among cybercriminals.

BitDefender uncovers a new large-scale malvertising campaign 

On October 30, BitDefender published a report detailing the findings of their investigation into a new malvertising campaign. The attackers behind this campaign have created hundreds of malicious Facebook ads. They are estimated to have reached at least a million people in Europe, the United States, Asia, and the rest of the world. 

The BitDefender analysis found that the ads — some of which are still running — impersonate video editing software like CapCut, productivity tools like Office 365 and Adobe, and video streaming services such as Netflix. They also impersonate a wide range of video games, including Grand Theft Auto and Minecraft.

A screenshot of a malvertising ad claiming to be Adobe Photoshop.
Over 75,000 users in Europe alone were targeted by this malicious campaign. Image: Screenshot, Moonlock. Facebook is a trademark of Meta Platforms, Inc.

The value of Facebook Business Accounts on the dark web

The attack method is simple. Threat actors target victims globally who are aged 18 to 65 (or 23 to 65). The lack of customization of demographic targeting in these ads reveals that the group is casting a wide net and not selecting any specific type of population group. 

After analyzing the SYS01 infostealer malware that the group is distributing, BitDefender warned that it is clear that they are after Facebook Business Accounts.

Facebook Business Accounts are highly priced in the underground dark web market. Having the credentials to breach Facebook Business Accounts allows bad actors to rapidly delete all existing account data. They can then change configurations and passwords to block out users, upload impersonating content, and, most importantly, use the accounts to promote their malicious sites by abusing the Facebook Ads platform.

“The scope of this attack is global, with potential victims in the millions, spanning regions such as the EU, North America, Australia, and Asia — particularly males aged 45 and above,” BitDefender said in the report.  

The group can also use the stolen information for illegal financial gains and continue to scale their attacks.

A screenshot of the Facebook Ad Library showing Blue Games Playbox, featuring numerous malicious ads.
Facebook Ad Library shows Blue Games Playbox, featuring numerous malicious ads. Image: Screenshot, Moonlock. Facebook is a trademark of Meta Platforms, Inc.

Criminals develop a large-scale malicious infrastructure

The ability to develop hundreds of malicious sites, impersonating brands like Netflix or Telegram, plus the knowledge required to take over Facebook accounts and abuse the Facebook ad platform, implies a group rich in resources and knowledge. 

Moonlock investigations show that most ads, and even websites, identified by BitDefender as associated with SYS01 were completely vacated before the embargo for this BitDefender investigation was cleared. Additionally, Facebook has already identified several ads from this group and flagged and banned them. 

The data indicates a large-scale infrastructure. Cybercriminals build hundreds of sites and promote them through email phishing, social media, or ad platform abuse (malvertising). However, this is nothing new. It’s a trend that has been growing rapidly in the past months.

Once groups are exposed by security researchers, they will close down the websites. But they don’t close down shop — they simply pivot to a new infrastructure that’s likely just as large-scale as the one exposed by researchers.

A screenshot of a Facebook notification that reads, "This content isn't available right now."
One of the Facebook channels identified in this campaign was gone before the BitDefender embargoed report broke online. Image: Screenshot, Moonlock. Facebook is a trademark of Meta Platforms, Inc.

BitDefender warned that this group is capable of evading detection by changing or adapting the malicious payloads (malware). They can do this practically in real-time via their C2 servers. 

“Once antivirus companies detect and block a version of the malware dropper, hackers enhance obfuscation methods and re-launch new ads with updated versions,” BitDefender said. 

This real-time C2 malware obfuscation technique speaks of the agility and skills of this group. It can easily pull off an infrastructure-disappearing act, just to continue operating in a new, undetected architecture. 

A screenshot of a page impersonating a download page for Telegram.
An active malicious download page impersonating Telegram. Image: Screenshot, Moonlock.

When victims click on these fake Facebook ads, they are usually directed to a MediaFire link or to a site that allows direct download of malicious software. 

“In many cases, the malware runs in the background while a decoy app — often mimicking the ad-promoted software — appears to function normally, making it difficult for the victim to realize they’ve been compromised,” BitDefender said. 

In many cases, the malware runs in the background while a decoy app — often mimicking the ad-promoted software — appears to function normally, making it difficult for the victim to realize they’ve been compromised.

BitDefender

Why are Middle Eastern small businesses listed as “Payers and Beneficiaries”? 

Moonlock investigated the malvertising campaign using the Facebook Ad Library. The platform allows anyone to gain insight into what ads are active and inactive. Moonlock found several peculiarities. 

Moonlock investigated the ads identified by BitDefender as part of the malicious campaign distributing infostealers. A look at the Facebook Ad Library revealed that all but one of said ads had Payers and Beneficiaries located in the Middle East. This includes a brick company in Iraq, a small business in Oman, a cloth shop in Kabul, Afghanistan, and a medical equipment company in Cairo, Egypt. 

A screenshot of a malvertising ad claiming to be Adobe Photoshop, this one with the Payer and Beneficiary listed as a brick company in Iraq.
Moonlock found that the Payer and Beneficiary listed for the malicious ads are almost all located in the Middle East. This one tracks back to a brick company in Iraq. Image: Screenshot,
A screenshot of the Facebook page for the associated brick company in Iraq.
Moonlock tracked the Payer and Beneficiary to this brick company in Iraq. Image: Screenshot, Moonlock. Facebook is a trademark of Meta Platforms, Inc.

Moonlock also found that one of the Beneficiaries and Payers of these ads listed an organization with a US address. That address was associated with Muslim mentors for children and teens. Another address directed Moonlock researchers to a financial consulting firm in Dubai.  

A screenshot of the malicious ad on Facebook showing the Beneficiary and Payer as SunnahCamp.
This malicious ad linked to the campaign lists Sunnah Camp as the Payer and Beneficiary. Sunnah Camp is an organization with a US-based address working to mentor Muslim kids and teens. Image: Screenshot, Moonlock. Facebook is a trademark of Meta Platforms, Inc.

It is important to note that these findings in no way determine that these companies are behind this campaign. 

A screenshot of another example of a Middle Eastern Payer and Beneficiary on Facebook.
More Middle Eastern Payers and Beneficiaries are listed in this malicious ad campaign. Image: Screenshot, Moonlock. Facebook is a trademark of Meta Platforms, Inc.
A screenshot of the homepage of a clothing store in Afghanistan linked to a malicious Facebook ad.
Moonlock tracked the Payer and Beneficiary listed in a malicious Facebook ad to this clothing store in Afghanistan. Stealing small- and medium-sized Facebook Business Accounts to use to launch attacks is common practice. But why are these ones all in the Middle East? Image: Screenshot, Moonlock.

Given that this malware distribution attack on Facebook is targeting people all over the world and appears to be financially motivated, the fact that all Payers and Beneficiaries are in the Middle East is strange indeed. 

The first step toward understanding the Middle Eastern connection

There are many possible explanations for this Middle Eastern connection. The most likely explanation is that these are compromised accounts that the hackers have taken over to run fake ads on Facebook.

However, the use of “money mules” to transfer funds or receive payments associated with ad campaigns, as well as the use of local small businesses to launder illicit funds, are common tactics in the Middle East. 

A screenshot of a malicious ad on Facebook impersonating Grand Theft Auto 5.
A Dubai-based financial consulting company was listed as the Beneficiary and Payer of one of the malicious ads on Facebook. Image: Screenshot, Moonlock. Facebook is a trademark of Meta Platforms, Inc.

Another possibility is that the threat group intentionally used accounts from the Middle East to divert attention from their true origins and make attribution more difficult.

Finally, running malicious operations on Facebook from accounts in the Middle East may also be a tactic to leverage a regional digital environment that is less scrutinized or regulated, making it easier to set up and operate fraudulent schemes.

Little is known about who’s behind the SYS01 infostealer despite it being active for years. However, Trust Wave believes that the malware is connected to another piece of malware known as Rilide. Who developed that one is also a mystery.

A screenshot of a medical equipment company listed as a Payer and Beneficiary in one of the malicious ads on Facebook.
A medical equipment company in Cairo, Egypt, was also listed as the Payer and Beneficiary in this malicious ad campaign on Facebook. Image: Screenshot, Moonlock.

Final thoughts 

As we have said before, these types of large-scale campaigns with auto-renewing infrastructures are becoming quite common, and they are extremely hard to shut down. The only way to put an end to these cybercriminal operations is through hard research and investigation that delivers accurate and precise attribution.

In simple terms, until authorities know who is pulling the strings on these digital monsters, it’s impossible to stop them. 

The perpetuation of these digital criminal trends does not mean users are unsafe. By enabling MFA (and biometrics if possible), not clicking on ads, double-checking URLs, and never downloading software from unsolicited or untrusted sources, users can strengthen their security posture and protect their data and privacy.

This is an independent publication, and it has not been authorized, sponsored, or otherwise approved by Meta Platforms, Inc. Facebook and Facebook Ads are trademarks of Meta Platforms, Inc.

Ray Fernandez Ray Fernandez
Ray has been covering tech and cybersecurity for over 15 years. His work has appeared on TechRepublic, VentureBeat, Forbes, Entrepreneur, and the Microsoft Blog, among others.