Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New Malware Sets Sights on Stealing Your Facebook Business Account

New Malware Sets Sights on Stealing Your Facebook Business Account

With so many businesses putting time and effort to cultivate an active following on social media, it only makes sense that cybercriminals try to get a piece of the pie.

A new malware strain particularly targets Facebook business accounts to run malicious advertising campaigns on your dime.

“Professional” Budget Tracking Templates Spread Social Media Malware

The cybercriminals behind this one definitely understand their audience. They’ve created malware that poses as a free budgeting spreadsheet that users can open up in Microsoft Excel or Google Sheets. So far, most of the cases reported involve the cybercriminals offering the tool via Facebook, specifically to business page admins, through Facebook Messenger. It’s likely that these “resources” can be shared in plenty of other ways as well.

Once opening the file, the malware “NodeStealer” is installed (although in some cases, it came with additional malware that could steal cryptocurrency, disable Microsoft Defender, and more). It then steals your social media credentials, in particular, your Facebook business credentials, and compromises your accounts so criminals can quickly deploy ads using your financial information to spread more malware.

If you’ve ever had any experience trying to work with Facebook to reclaim an account (or get any kind of professional support as a small business on the social network) you probably can guess how painful this can become if your organization values its social media presence.

How to Avoid this Cyberthreat

Like most threats, it comes down to thinking before you click. If someone you don’t know is randomly offering you a free resource, do a little research before you just click on it and download it. If something seems suspicious, it probably is.

Also, make sure you have multi-factor authentication set up for your Google, Facebook, Microsoft, LinkedIn, and Twitter/X accounts, as well as any other accounts that offer it. This is a huge additional layer of security that will keep most bad guys out of your stuff even if your passwords become compromised.

Of course, if you think something has been compromised, you should also update all of your passwords.

Looking to avoid cyberthreats and secure your business? Give us a call at 800.618.9844 to talk about how we can keep your organization safe.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 03 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery AI Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Gadgets Covid-19 Cloud Computing Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office WiFi Apple Networking App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Conferencing Bring Your Own Device Managed IT Services Big Data Operating System Computers Router Physical Security 2FA Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Healthcare Augmented Reality Retail Storage Password The Internet of Things Windows 7 Scam Data loss Microsoft 365 Social Cooperation Solutions Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Customer Service Cybercrime Windows 11 Display Printer Excel Paperless Office Infrastructure Monitoring Remote Workers Firewall Document Management Free Resource Project Management Telephone Images 101 Mouse Licensing Multi-Factor Authentication Mobility Entertainment Administration Telephone System Robot Employees Customer Relationship Management Integration Cost Management Settings Printing Wireless Content Filtering Hacking IT Management Holidays Presentation VPN YouTube Meetings Cryptocurrency Data Storage Wireless Technology Supply Chain User Tip Modem Computer Repair Mobile Security Video Conferencing Processor Managed Services Provider Virtual Machines Professional Services Virtual Desktop LiFi Data storage Smart Technology Word Outlook Machine Learning iPhone Money Saving Time Humor Managed IT Service Vulnerabilities Maintenance Safety Data Privacy Antivirus Sports Downloads Social Engineering Break Fix IT Assessment IT Maintenance Browsers Education Connectivity Upload Remote Computing Flexibility Value Business Intelligence Shortcuts Mobile Computing Social Network Multi-Factor Security Organization Search Dark Web Digital Security Cameras Smart Devices Ransmoware Tablet IoT Application Best Practice Trends Alert Remote Working Memory Vendors Data Breach Google Play Be Proactive Managed IT Customer Resource management Buisness File Sharing Regulations Dark Data Google Calendar How To Microsoft Excel Videos Electronic Health Records IBM Workforce Legal Data Analysis IT solutions Star Wars Business Growth Gamification Notifications Staff Wasting Time Threats Trend Micro Security Cameras Workplace Strategies Travel Social Networking Legislation Cortana Software as a Service Meta Techology Fileless Malware Google Maps Alt Codes Content Wearable Technology Managing Costs Amazon eCommerce Competition SSID Health IT Downtime Unified Threat Management Motherboard Comparison Hosted Solution Assessment Permissions Surveillance Virtual Assistant Outsource IT Unified Threat Management Directions Virtual Machine Environment Media Typing Network Congestion Specifications Reviews Medical IT User Internet Exlporer Knowledge Fraud Development Transportation Small Businesses Google Drive User Error Microchip Hypervisor Displays Username 5G Black Friday Shopping Optimization PowerPoint Point of Sale Unified Communications Database Experience IP Address Employer/Employee Relationships Outsourcing Google Docs Navigation Bitcoin Network Management Running Cable Tech Support IT Technicians PCI DSS Monitors Cyber Monday Gig Economy Workplace Google Wallet Proxy Server Cookies Recovery Tactics Hotspot Internet Service Provider Teamwork Hiring/Firing Hard Drives Evernote Paperless Windows 8 Laptop Websites Mirgation Regulations Compliance Memes Domains Co-managed IT Drones Nanotechnology Addiction Electronic Medical Records Language Net Neutrality SQL Server Technology Care SharePoint History Refrigeration Business Communications Management Halloween Chatbots Financial Data Writing Distributed Denial of Service Smartwatch IT Public Speaking Scams Lenovo Screen Reader Service Level Agreement Virtual Reality Computing Infrastructure Procurement Lithium-ion battery Azure Hybrid Work Cyber security Tech Human Resources Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Telework Fun CES Communitications Cables Superfish Bookmark Identity Theft Smart Tech Deep Learning Download Twitter Alerts Supply Chain Management Undo Term Google Apps Error FinTech

Blog Archive