There's a new vairant of the Facebook Token Hijacker malware on the loose, and this time it's improved. The new version of the malware now has improved obfuscation techniques to keep its code hidden from anti-malware software.

This malware sends the target user a post on Facebook claiming a special offer on UGG boots, and the user is asked to post her access token after logging into an application using Facebook's oAuth (the app ID is 350685531728). After successfully logging in, the malware hijacks the user's token and starts posting on her wall. In addition to posting, this malware also attempts to create an event and invite all the victim's friends to it.

Here is a sample of the posts generated by the malware:

halls-of-valhalla.org/images/news/facebook_malware_ugg_boots.png

Unlike typical phishing attacks, this attack starts exploiting the victim immediately and automatically (without being challenged by Facebook's Identity and Access Management Controls) after obtaining the necessary data.

The malware is currently residing on this host (which is not https unlike its predecessor): http://fbunlimited.info/instagram/
During the process, the malware posts data to these links:
http://hub.zabavno.co/?h=108883048315&o=10679714&t=1359836734&tkn=
http://fbunlimited.info/instagram/save.php?postback=y&country=
http://23.23.248.101/u/141689081/e357DuaM6d/chwm5rIocK9M/homepage.html?z=13598367341144'

A partially obfuscated version of the javascript used by this malware can be found here: http://www.faghani.info/blog/malware.txt

Sources:
Seclists