The malware, dubbed TSPY_MINOCDO.A, is delivered on the target system either via Trojan droppers or via drive-by-download schemes on compromised sites.
Once downloaded on the computer, the Trojan ensures its persistence by registering itself as a system service to ensure automatic execution at every system startup. It then modifies the affected system's HOSTS files, so that users trying to visit www.facebook.com or facebook.com are redirected to a fake Facebook Security Check page:
The information submitted into the false form gets delivered to the crooks behind this scheme, and the Trojan also collects and delivers information about the compromised system.
"Upon further analysis, we also discovered that that the malware performs DNS queries to several domain names. What this means that the people behind this are prepared for server malfunction and has a backup to continue stealing information," the researchers added.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.