Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New Malware Sets Sights on Stealing Your Facebook Business Account

New Malware Sets Sights on Stealing Your Facebook Business Account

With so many businesses putting time and effort to cultivate an active following on social media, it only makes sense that cybercriminals try to get a piece of the pie.

A new malware strain particularly targets Facebook business accounts to run malicious advertising campaigns on your dime.

“Professional” Budget Tracking Templates Spread Social Media Malware

The cybercriminals behind this one definitely understand their audience. They’ve created malware that poses as a free budgeting spreadsheet that users can open up in Microsoft Excel or Google Sheets. So far, most of the cases reported involve the cybercriminals offering the tool via Facebook, specifically to business page admins, through Facebook Messenger. It’s likely that these “resources” can be shared in plenty of other ways as well.

Once opening the file, the malware “NodeStealer” is installed (although in some cases, it came with additional malware that could steal cryptocurrency, disable Microsoft Defender, and more). It then steals your social media credentials, in particular, your Facebook business credentials, and compromises your accounts so criminals can quickly deploy ads using your financial information to spread more malware.

If you’ve ever had any experience trying to work with Facebook to reclaim an account (or get any kind of professional support as a small business on the social network) you probably can guess how painful this can become if your organization values its social media presence.

How to Avoid this Cyberthreat

Like most threats, it comes down to thinking before you click. If someone you don’t know is randomly offering you a free resource, do a little research before you just click on it and download it. If something seems suspicious, it probably is.

Also, make sure you have multi-factor authentication set up for your Google, Facebook, Microsoft, LinkedIn, and Twitter/X accounts, as well as any other accounts that offer it. This is a huge additional layer of security that will keep most bad guys out of your stuff even if your passwords become compromised.

Of course, if you think something has been compromised, you should also update all of your passwords.

Looking to avoid cyberthreats and secure your business? Give us a call at 800.618.9844 to talk about how we can keep your organization safe.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 28 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Small Business Microsoft Productivity Managed Service Quick Tips Saving Money Passwords Communication Cybersecurity Smartphone Data Backup Android Disaster Recovery Data Recovery AI Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Holiday Automation Information Artificial Intelligence Gadgets Cloud Computing Training Covid-19 Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Windows 10 Virtualization Wi-Fi Blockchain Business Technology Bandwidth Data Security Apps Two-factor Authentication Mobile Office Vendor Gmail Apple Networking WiFi App Managed Services Voice over Internet Protocol Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Budget How To BDR Conferencing Computing Information Technology Hacker Access Control Avoiding Downtime Office 365 HIPAA Marketing Applications Storage Password Bring Your Own Device 2FA Help Desk Managed IT Services Big Data Healthcare Operating System Virtual Private Network Risk Management Computers Health Analytics Website Office Tips Router Augmented Reality Retail Firewall Scam Windows 11 Data loss Monitoring The Internet of Things Excel Going Green Patch Management Social Remote Workers Save Money Remote Monitoring Vulnerability End of Support Telephone Vendor Management Cybercrime Physical Security Customer Service Cooperation Free Resource Project Management Display Printer Windows 7 Paperless Office Infrastructure Microsoft 365 Solutions Document Management Processor Maintenance Mobile Security Sports Antivirus Mouse Holidays Safety Data Storage Administration Smart Technology Supply Chain Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Robot Managed IT Service Settings Printing Downloads Wireless iPhone Content Filtering IT Management Customer Relationship Management Licensing VPN YouTube Meetings Entertainment Vulnerabilities Cryptocurrency Data Privacy Hacking Images 101 Presentation Computer Repair Telephone System Multi-Factor Authentication Virtual Desktop Mobility Data storage Cost Management LiFi Wireless Technology Outlook Machine Learning Employees Money Humor Integration Word User Tip Modem Database Surveillance Deep Learning Public Speaking Virtual Assistant Outsource IT Twitter Lithium-ion battery IT Technicians Virtual Machine Environment Error Media Proxy Server Reviews Cookies Education Cyber Monday Medical IT Social Engineering Entrepreneur Tactics Development Hotspot Transportation Small Businesses Remote Computing Mirgation Hypervisor Displays Mobile Computing Shopping Nanotechnology Optimization Tablet Undo PowerPoint Search Addiction Best Practice Language Employer/Employee Relationships Outsourcing Alert Chatbots Buisness File Sharing Navigation Dark Data Management PCI DSS Managed IT Gig Economy Legal Screen Reader IT solutions Distributed Denial of Service Workplace How To Service Level Agreement Internet Service Provider Business Growth Computing Infrastructure Teamwork Hiring/Firing Notifications Identity Travel Application Evernote Paperless Regulations Compliance Bookmark Techology Smart Tech Memes Google Maps Co-managed IT Cortana Download Net Neutrality Alt Codes IBM Alerts SQL Server Technology Care History Downtime Unified Threat Management Business Communications Financial Data Browsers Smartwatch Unified Threat Management Connectivity IT Hosted Solution Break Fix Scams Upload Procurement Typing Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Network Congestion Social Network Telework CES Google Drive User Error IoT Communitications Competition Dark Web Cables Knowledge Trends Supply Chain Management Customer Resource management FinTech Regulations Point of Sale Google Calendar Term Google Apps 5G Data Analysis Google Docs Star Wars IT Assessment Unified Communications Microsoft Excel IT Maintenance Experience Staff Value Business Intelligence Running Cable Tech Support User Gamification Flexibility Bitcoin Network Management Organization Google Wallet Social Networking Legislation Shortcuts Monitors Fileless Malware Digital Security Cameras Smart Devices Ransmoware Wearable Technology Memory Vendors Laptop Websites Content Remote Working Windows 8 IP Address Health IT Drones Motherboard Data Breach Comparison Google Play Be Proactive Directions Videos SharePoint Assessment Electronic Health Records Permissions Workforce Electronic Medical Records Wasting Time Threats Halloween Recovery Lenovo Trend Micro Hard Drives Specifications Security Cameras Workplace Strategies Writing Microchip Internet Exlporer Software as a Service Domains Fraud Meta Virtual Reality Managing Costs Amazon Scary Stories Private Cloud Username Hacks Server Management Superfish eCommerce Identity Theft Refrigeration Black Friday SSID Fun

Blog Archive