Skip to Content
Malware targeting your Windows PC
© Mishoo | Dreamstime.com
Security & privacy

Windows malware can steal social media credentials, banking logins and more

Many pieces of personal information are valuable to hackers and scammers. Your Social Security number can spell lots of trouble in the wrong hands. Your credit card and banking information is highly sought after, too, as criminals can drain your account in seconds.

But one of the most lucrative data points for any cybercriminal is your social media details. By hacking into your account, criminals can spread malware to your contacts, trick them out of money and use it for other illegal activities.

Now, criminals are targeting your Windows PC. Read on for details and ways to stay protected.

Here’s the backstory

While old malware is often recycled into updated versions, hackers constantly create new methods to steal details and information. Security researchers at Zscaler recently made such a discovery, calling the new malware Win32.PWS.FFDroider.

The malware creates a registry entry in Windows-based computers to steal login credentials and internet browser cookies. The research team noted that the FFDroider malware spreads through illegal copies of Study Math Live and other freeware installers.

Zscaler was able to determine that FFDroider can:

  • Steal your browser cookies and send them to a central server.
  • Read through your cookies, looking for social media login credentials.
  • Access the safelists rules in Windows to make copies of itself.

The latest threats don’t stop there. Another malware variant feature is infiltrating your social media accounts and using your Facebook Ads Manager details for malicious advertising or stealing your banking information. Hackers can also tunnel through Instagram to extract personal data.

FFDroider disguises itself as the hugely popular chatting application Telegram to avoid detection.

While it’s not new, another malware variant is spreading at an alarming pace. Microsoft recently put measures in place to prevent the dangerous Qbot malware from replicating through Microsoft Office files.

Hackers are now adapting the malware to spread through MSI Windows Installer packages. Once installed, the malware can:

  • Steal your social media login details and banking information.
  • Edit your Windows registry to avoid detection for replication.

Qbot can inject itself into email conversations to try and find more victims. It uses the reply-all function and verbiage from previous emails. This tactic makes the email appear legitimate and easier to fool potential victims.

What you can do about it

Thankfully you can take steps to keep your data private and stay protected from these types of malware threats. Here are some suggestions:

  • Only download apps and programs from official sources. Avoid third-party app stores since they don’t have top-notch security protocols.
  • Never click on links or open attachments found in unsolicited emails. They could be malicious and infect your device with malware.
  • Keep your device’s operating system, apps and virus protection updated.

You should also have robust antivirus software on all your devices. We recommend our sponsor, TotalAV.

TotalAV’s industry-leading security suite is easy to use and offers the best protection in the business. They’ve received the renowned VB100 award for detecting more than 99% of malware samples for the last three years.

Right now, get an annual plan of TotalAV Internet Security for only $19 at ProtectWithKim.com. That’s over 85% off the regular price!

Keep reading

Do you connect your Android to a Windows PC? Changes are coming

Microsoft announces big updates coming to Windows 11

Komando Community background

Join the Komando Community

Get even more know-how in the Komando Community! Here, you can enjoy The Kim Komando Show on your schedule, read Kim's eBooks for free, ask your tech questions in the Forum — and so much more.

Try it for 30 days