Surprise Comeback of Faceliker Malware that Manipulates Facebook Likes

Nowadays social networking sites becomes an inseparable part of the society’s life, so the cyber offenders prey for the victims online. Malware researchers from McAfee security lab had reported about a sudden surge in the detections for Faceliker malware that can take over the Internet browsers and manipulate the Facebook likes. It follows the hackers command with the main purpose of promoting fake news, social media trends and other malicious contents as well. However, the Faceliker malware is not recognized as a new virus and it is being spotted few years back. It is a generic detection which describes the malware that takes over the infected user’s web browsers.

Thereafter, it uses malicious JavaScript code in order to perform click-jacking for giving Facebook ‘likes’ to content received from the scammers command and control server. The main proliferation method used by the criminal hackers is a software bundling. Usually, Faceliker virus is distributed over the network and infect the targeted user’s computer with the help of rogue browser add-ons. It generally packed in the browser’s plug-ins and especially in the form of dubious extension of Google Chrome. Meanwhile, the system users are lured into the web portals which is used to promote such malicious or rogue browser extensions. Furthermore, the cyber crooks also uses spam email attachments or Facebook Messenger Spam in order to distribute Faceliker malware or other nasty Trojans like Trojan.Flokboti!gen1 over the Internet.

However, there are noticeable increase the rogue Google Chrome extension responsible for spreading Faceliker malware during the same time period when the researchers detected sudden rise in the Faceliker Trojan. Some of malicious Chrome extensions comes with even more harmful features, besides just giving ‘likes’ to some predetermined Facebook stories. Based on the research report, this malware is accounted for almost 8.9% of the 52 million new computer malware sampled that were detected in the mid of year 2017. This is considered as one of the key driving forces behind the 67% increase in the system malware detections for that same time period.

While the Faceliker is identified as a generic term used by the con artists to gives Facebook likes, but the system users should be aware that the Trojan viruses never stands still. Most of the today’s Trojan horse viruses which giving the Facebook likes, are also has the ability to steal confidential information from the infected computers including user name, email ID, passwords, credit card details etc. They also have the capability of promoting dubious contents over other networks or inserting intrusive ads and pop-ups onto the top of legitimate domain that you visit. Therefore, the system users who notice strange likes for the content that they don’t usually ‘like’ onto the Facebook should search their Internet browsers for dubious extension and remove Faceliker malware immediately from their machine.

Manual Steps To Eliminate Trojan Virus From Compromised Windows PC

Start Windows PC in Safe Mode To Delete Trojan Virus

  • Tap ‘F8’ key continuously once the system is powered on or restarted.

  • Here, you will see ‘Advanced Boot Options’ window on your computer screen.

  • Use arrow key in order to select the ‘Safe Mode with Networking’ option and hit ‘Enter’ button.

  • Now, you can find and remove the malware safely from your machine.

Notice: For more information related to Trojan removal, kindly visit:

Uninstall Malware Related Programs From Windows Control Panel

  • Click on ‘Start’ button and go to ‘Control Panel’ menu option.

  • In the appeared window, tap on ‘Uninstall a Program’ option placed under ‘Programs’ category.

  • In the list of installed programs, you can select Trojan related malicious program and tap on ‘Uninstall’ button.

Eliminate Malicious Processes of Trojan From Windows Task Manager

  • Press ‘Ctrl + Alt + Del’ keys altogether to open the Task Manager.

  • Click on ‘Processes’ tab and identify the virus related processes.

  • Select the malicious processes and tap on ‘End Process’ button.

Clean Harmful Registry Entries of Malware From Registry Editor

  • Press ‘Win + R’ key to open the ‘Run’ box.

  • In the appeared ‘Run’ box, type ‘regedit’ and hit ‘Enter’ button.

  • Here, you need to find and select malicious registry entries created by Trojan and delete them as soon as possible.

Leave a Reply

Your email address will not be published. Required fields are marked *