Watch where you click - adult sites are hiding clickjacking malware in images, and all for Facebook likes

Shocked woman worker looking at laptop screen
(Image credit: fizkes / Shutterstock)

  • Malicious SVG files are being weaponized to secretly like Facebook posts without user consent
  • Attackers hide obfuscated JavaScript in images to bypass detection and execute dangerous social media hijacks
  • Trojan.JS.Likejack silently boosts targeted Facebook posts by exploiting active sessions of unsuspecting victims

Security researchers have uncovered dozens of adult websites which are embedding malicious code inside Scalable Vector Graphics (.svg) files.

Unlike common image formats such as JPEG or PNG, SVG files use XML text to define images, which can include HTML and JavaScript.

This feature makes SVG suitable for interactive graphics but also opens the door for exploitation through attacks like cross-site scripting and HTML injection.

How the clickjacking attack works

Research from Malwarebytes found selected visitors to these websites encounter booby-trapped SVG images.

When clicked, the files run heavily obfuscated JavaScript code, sometimes using a hybrid version of a technique known as “JSFuck” to disguise the script’s true purpose.

Once decoded, the code downloads further JavaScript, ultimately deploying a payload identified as Trojan.JS.Likejack.

If the victim has a Facebook session open, the malware silently clicks “Like” on a targeted post without consent, boosting its visibility in social feeds.

The boost in visibility increases the chances that the targeted post will appear in more users’ feeds, effectively turning unsuspecting visitors into promoters without their knowledge.

The abuse of SVG files is not new. Two years ago, pro-Russian hackers exploited the format to carry out a cross-site scripting attack against Roundcube, a webmail platform used by millions.

More recently, phishing campaigns have used SVG files to open fake Microsoft login screens pre-filled with victims’ email addresses.

Researchers found many of these attacks originate from interconnected websites, often hosted on platforms like blogspot[.]com, and sometimes offering explicit celebrity images likely generated by artificial intelligence.

Facebook routinely shuts down accounts involved in such abuses, but those behind the campaigns often return with new profiles.

As more regions introduce age verification rules for adult content, some users may turn to less-regulated sites that deploy aggressive promotion tactics.

How to stay safe

The effect of this campaign goes beyond unwanted social media interactions. These tactics can be used for more harmful purposes, including identity theft or credential harvesting.

Experts recommend using updated security suites that can detect and block suspicious domains.

Also, ensure that your system has a properly configured firewall to prevent unauthorized data transfers.

Real-time protection can help identify threats before they execute, and awareness of file formats capable of running code is essential.

While using a VPN can help maintain privacy, it is not a substitute for strong endpoint protection and cautious online behavior.

Above all - be careful about what you click on the internet.

You might also like

Efosa Udinmwen
Freelance Journalist

Efosa has been writing about technology for over 7 years, initially driven by curiosity but now fueled by a strong passion for the field. He holds both a Master's and a PhD in sciences, which provided him with a solid foundation in analytical thinking. Efosa developed a keen interest in technology policy, specifically exploring the intersection of privacy, security, and politics. His research delves into how technological advancements influence regulatory frameworks and societal norms, particularly concerning data protection and cybersecurity. Upon joining TechRadar Pro, in addition to privacy and technology policy, he is also focused on B2B security products. Efosa can be contacted at this email: udinmwenefosa@gmail.com

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.