Skip to main content

Facebook Sued Hong Kong Firm for Hacking Users and Ad Fraud Scheme

Facebook sued

Following its efforts to take legal action against those misusing its social media platform, Facebook has now filed a new lawsuit against a Hong Kong-based advertising company and two Chinese individuals for allegedly abusing its ad platform to distribute malware and Ad fraud.

Facebook filed the lawsuit on Thursday in the Northern District of California against ILikeAd Media International Company Ltd. as well as a Chinese software developer and a marketing director working for the firm, Chen Xiao Cong and Huang Tao.

All three defendants have been alleged to have deceived people into installing malware on their systems, enabling them to compromise user's Facebook accounts and then using those hacked accounts to advertise counterfeit goods and diet pills—which is clearly in violation of Facebook's Terms and Advertising Policies.

"The suit seeks to hold accountable ILikeAd Media International Company Ltd. and Chen Xiao Cong and Huang Tao for creating the malware, tricking people into installing it, compromising people's Facebook accounts and then using people's accounts to run deceptive ads," Facebook said in a blog post today when announcing the lawsuit.

According to the social media giant, the defendants made use of improper practices such as "celeb bait" and "cloaking" to bait Facebook users into downloading and installing malware that eventually compromised their Facebook accounts.

While 'cloaking' involves deliberately disguising the true destination of a link in the ad by displaying one version of the ad's landing page to Facebook and another version to Facebook users, 'celeb bait' involves misusing celebrities photos in ads to entice users to click on them.

"Cloaking schemes are often sophisticated and well organized, making the individuals and organizations behind them difficult to identify and hold accountable. As a result, there have not been many legal actions of this kind," Facebook said.

Since April, Facebook has notified hundreds of thousands of users that their accounts may have been compromised and instructing them to change their passwords, according to the complaint.

Facebook also said the social media company had issued more than $4 million in refunds to victims whose Facebook accounts were used to run unauthorized ads and also helped to secure their accounts compromised in this malicious advertisement scheme.

This is the latest lawsuit that Facebook filed in a federal court against entities and individuals abusing its properties for malicious intent.

Just over a month ago, Facebook sued surveillance vendor NSO Group for allegedly hacking 1,400 mobile devices by misusing the company's secure messaging platform, WhatsApp.

In August this year, Facebook also filed a lawsuit against two shady Android app developers, Hong Kong-based 'LionMobi' and Singapore-based 'JediMobi,' for allegedly running a "click injection fraud" scheme that programmed bots to click on Facebook ads.

In March this year, Facebook also took two Ukrainian men into the courts for allegedly using quiz apps on the platform to distribute malware that steals Facebook users' data.

Comments

Popular posts from this blog

10 Best Forum Software For Webmasters

10 Best Forum Software For Webmasters Do you want to create your online discussion forum or online community where people can discuss about their favorite topics? In this article, you can see 10 best forum software (scripts for setting up discussion forums) that can be used free of cost. Although some scripts are paid but rest of these forum scripts are free to use.You only need to buy hosting space and domain name for your website and after then you can install any of these forum scripts to start your own discussion forums on the internet. Online discussion forums generate huge page views because thousands of people want to join online discussion forums to ask questions or share knowledge. Some of online marketers join forums to discuss about their products with community members. You don't need to acquire any kind of technical skill to run a professional discussion forums because these days, almost all web hosting providers offer one click script installer which h...

How to Hack WhatsApp using just a GIF

A picture is worth a thousand words, but a GIF is worth a thousand pictures. Today, the short looping clips, GIFs are everywhere—on your social media, on your message boards, on your chats, helping users perfectly express their emotions, making people laugh, and reliving a highlight. But what if an innocent-looking GIF greeting with Good morning, Happy Birthday, or Merry Christmas message hacks your smartphone? Well, not a theoretical idea anymore. WhatsApp has recently patched a critical security vulnerability in its app for Android, which remained unpatched for at least 3 months after being discovered, and if exploited, could have allowed remote hackers to compromise Android devices and potentially steal files and chat messages. WhatsApp Remote Code Execution Vulnerability The vulnerability, tracked as  CVE-2019-11932 , is a double-free memory corruption bug that doesn't actually reside in the WhatsApp code itself, but in an open-source GIF image parsing library that What...

|Bypass Symlink on 2013 Server With Different .htaccess and Methods by Sen Haxor |

Hi, Guys,  Please a wonderfull tutorial provided bt Sem;\  Today I gonna Explain how to bypass Symlink on 2013 Server With Different .htaccess and Methods. So let's Get Started :) Note: This method is not applicable for Godaddy, Bluehost, Hostgator and Hostmonstor Servers. For This First You Need the Following Files : 1 -> Sen Haxor CGI Shell 2 -> sen.zip 3 -> passwd-bypass.php 4 -> Turbo Brute force Cpanel 5 - > Port.py First Before Starting to symlink we need to create php.ini and ini.php to Disable Safe mode and Disabled Functions on the server . Use the Following Code : Make a php.ini with the following code safe_mode=Off And ini.php with <? echo ini_get("safe_mode"); echo ini_get("open_basedir"); include($_GET["file"]); ini_restore("safe_mode"); ini_restore("open_basedir"); echo ini_get("safe_mode"); echo...