Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email: dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR: danchodanchev@xmpp.jp | TOX ID: 2E6FCA35A18AA76B2CCE33B55404A796F077CADA56F38922A1988AA381AE617A15D3D3E3E6F1
Sunday, December 06, 2020
Exposing a Pay-Per-Install and Rogue Spyware Command and Control Database Interface

Rogue Facebook applications distribute adware
BitDefender is reporting on
What's so special about this bogus Facebook application? It's a rebranded version of a similar adware-serving Facebook app from last week.
-------------------------------------------------------------------
Numerious Facebook users are already posting
"Redhot sexy girl in thong dancing [HQ]"
NEW ONE:
"Sexy masseur gone out of control! [HQ]."
Name of application:
'MXF Movi | Facebook'
http://www.facebook.com/apps/application.php?id=106744506034490
http://apps.facebook.com/mxfmovi/
http://downloads.allokfree.com/FLVDirect.exe
- The rogue application requires you to allow it to access your profile
- Since the self-repblicain is abusing trust, you may want to reconsider allowing access to sent by your friends
- It offers your video content that is only viewable with their malware-sih app -- ow convinient indeed
-
-'
