Since late August, the Kaspersky Global Research and Analysis Team (GReAT) has been observing a new malicious campaign leveraging a stealer – a type of malware designed to steal passwords and other account information – dubbed StealC v2 and being spread through Facebook messages.

More than 400 incidents have been identified to date, targeting users across multiple countries including confirmed cases in Kenya, Angola, Ethiopia, Niger, Uganda, and Zambia, among other African countries.

As part of this attack, Facebook users receive messages containing a link disguised as a notification that their account has been blocked.

Clicking the link opens a fake support page claiming that the user’s account has been blocked due to suspicious activity. To “restore access,” users are prompted to use the “Appeal” button which initiates the download of a malicious script that installs the StealC v2, a dangerous malware offered under a Malware-as-a-Service model, on the victim’s device. The malware itself steals passwords, cookies, screenshots, as well as cryptocurrency wallet data.

“Cybercriminals often exploit users’ fear of losing account access and a perceived sense of urgency,” says Marc Rivero, lead security researcher at GReAT. “This pressure can lead individuals to act without caution, increasing the risk of infection by malware such as StealC v2. Users should remain vigilant and always verify the authenticity of messages before clicking any links.”

StealC v2, first observed this year, significantly enhances the malware’s capabilities and elevates the risk to both individual and corporate users. The original StealC, which emerged in 2023 on dark web platforms, quickly became a sought-after tool among cybercriminals thanks to its accessibility, capabilities, and ease of access.