Facebook Hacking Software – The Windows-based Trojan That Has Accelerated Globally
A newly discovered Facebook hacking tool actually has the capability to hack Facebook account, but YOURS, and not the one you desire to hack.
How to Hack Facebook account? How to Hack my Girlfriends Facebook account? My boyfriend is cheating on me, How do I hack his Facebook Account?
These are the queries that most of the Internet users search on Google.
But Beware! If you come across any Facebook hacking tool that promises you to help you hack your friends Facebook accounts, you may end up downloading a hacking tool that could hack you, instead of them.
Facebook Hacking Tool that Can Really Hack, But Your Accounts
The tool contains a Keylogger that can capture all your keystrokes and store them in a file that is subsequently sent to the attacker’s server.
The malicious Facebook hacking tool is exploiting “the constant desire of a lot of users to take control of accounts from this well-known social network,” according to a Monday blog post by IT security company ESET.
How Remtasu Works:
The malicious tool is delivered via direct download websites.
Once a user visits one of these websites, the dangerous Win32/Remtasu.Y malware automatically gets downloaded and executed on victim’s machine and hide itself among other files.
Remtasu has capability to:
- Open and obtain information from the clipboard.
- Capture keystrokes.
- Store all the data in a file which is subsequently sent to an FTP server.
The worst part is yet to come:
The malware remains on the infected computer even when the victim reboots their system or attempts to find the malware threat in the list of active processes.
“In this case, the malware replicates itself, saving the copy in a folder that it also creates within the system32 folder,” reads the post. “The new InstallDir folder remains hidden inside the system files, making it difficult for users to access.”
Most affected parts of the world include Colombia, Turkey, Thailand and elsewhere. In past, Remtasu was distributed through malicious files attached to phishing emails purporting to be from legitimate government or businesses organisations.