Criminals are targeting Bitcoin owners on Facebook with a multi-stage malware campaign – follow these steps to stay safe

- Experts warn Facebook crypto ads now deliver malware through trusted brand impersonation
- Malware deploys only when victims meet specific browser or profile criteria
- Local server and PowerShell commands allow stealthy data exfiltration and control
A new wave of malware attacks is targeting Bitcoin and crypto owners through Facebook ads that mimic trusted names in the industry.
Bitdefender says it has uncovered a multi-stage malvertising campaign that exploits the reputations of well-known platforms like Binance, TradingView, ByBit, and others.
These malicious ads don’t just trick users, they also adapt in real time to avoid detection and deliver malware only when conditions are ideal for the attackers.
Highly evasive delivery system
The scheme begins when cybercriminals hijack or create Facebook accounts and use Meta’s ad network to run fraudulent promotions.
These ads feature fake offers and use photos of celebrities – Zendaya, Elon Musk, and Cristiano Ronaldo are the usual suspects – to appear more convincing.
Once clicked, users are redirected to lookalike websites that impersonate legitimate cryptocurrency services and prompt them to download what appears to be a desktop client.
The malware delivery system is highly evasive. Bitdefender says the front-end of the fake site works with a local server quietly spun up by the initial install, allowing attackers to send payloads directly to the victim’s system while dodging most security software.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Delivery only happens if the victim meets specific criteria, such as being logged into Facebook, using a preferred browser like Microsoft Edge, or matching a certain demographic profile.
Some malware samples run lightweight .NET servers locally and communicate with the website using advanced scripts that execute encoded PowerShell commands. These can exfiltrate sensitive data like installed software, system and OS info, and even GPU details.
Depending on the findings, the malware may download further payloads or simply go dormant if it suspects it’s being analyzed in a sandbox.
Bitdefender researchers found hundreds of Facebook accounts promoting these campaigns. One ran more than 100 ads in a single day. Many ads target men aged 18 and older, with examples found in Bulgaria and Slovakia.
How to stay safe
Scrutinize ads carefully: Be highly skeptical of ads offering free crypto tools or financial perks. Always verify links before clicking.
Download from official sources only: Visit platforms like Binance or TradingView directly. Never trust redirects from ads.
Use link-checking tools: Tools like Bitdefender Scamio or Link Checker can alert you to dangerous URLs before you engage.
Keep your security software up to date: Use a reputable antivirus that gets regular updates to catch evolving threats.
Watch for suspicious browser behavior: Pages that insist you use Edge or redirect erratically are massive red flags.
Report shady ads: Flag suspicious content on Facebook to help others avoid falling into the same trap.
You might also like
Experts warn Facebook crypto ads now deliver malware through trusted brand impersonation Malware deploys only when victims meet specific browser or profile criteria Local server and PowerShell commands allow stealthy data exfiltration and control A new wave of malware attacks is targeting Bitcoin and crypto owners through Facebook ads that…
Recent Posts
- Criminals are targeting Bitcoin owners on Facebook with a multi-stage malware campaign – follow these steps to stay safe
- Apple may release a ‘mostly glass, curved iPhone’ in 2027
- I may have found my perfect PC chassis: A Ryzen 7 rig, built in a foldable keyboard that you can fit into a (large) trouser pocket
- Trump fires head of Copyright Office two days following report that AI training may not be fair use
- Asus brings Nvidia’s fastest superchip to a very boring desktop PC chassis, but there’s even a DVD player and a mysterious slot
Archives
- May 2025
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010