Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

AI replaces humans: Klarna replaces 700 employees with AI, slashing the workforce by 40%

Israeli military fire hits South Lebanon base for the first time since ceasefire | Israel attacks Lebanon news

Kids Online Safety Act may return and change the internet

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » CTM360 Identifies a surge in phishing attacks targeting metabusiness users
Identity

CTM360 Identifies a surge in phishing attacks targeting metabusiness users

userBy userMay 14, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 14, 2025Hacker NewsPhishing/Malware

Phishing Attack

A new global phishing threat, called “Meta Mirage,” has been revealed, and it is using Meta’s business suite to target businesses. The campaign is specifically intended to hijack high value accounts that include advertising management and official branded pages.

CTM360 cybersecurity researchers have revealed that the attacker behind Meta Mirage will spoof as official meta communications and trick users into handing over sensitive details such as passwords and security codes (OTPs).

The scale of this operation is amazing. Researchers have already identified over 14,000 malicious URLs, the majority (usually 78%) were not blocked by the browser at the time the report was published.

Cybercriminals skillfully hosts fake pages that leverage trusted cloud platforms such as Github, Firebase, and Vercel, making it difficult to spot scams. This method is closely in line with recent findings from Microsoft, highlighting similar exploitation of cloud hosting services, ensuring that Kubernetes applications can compromise on attackers frequently leverage trustworthy platforms to avoid detection.

The attacker deploys fake alerts about policy violations, account suspensions, or emergency verification notifications. These messages are sent via email and direct messages, but are persuasive as they mimic official communications from the meta and often seem urgent and authoritative. This tactic reflects the techniques observed in a recent Google Sites Phishing campaign, which used Google Hosted pages that looked real to deceive users.

Two main methods are used.

Credentials: Victims enter their password and OTP into fake websites that look realistic. The attacker intentionally triggers a fake error message, allowing the user to re-enter the details, ensuring accurate and usable stolen information. Cookie Theft: Scammers also steal cookies from their browsers, allowing you to continue access to compromised accounts without a password.

These compromised accounts not only affect individual businesses, but are often exploited to run malicious ad campaigns, amplifying the damage, as well as the tactics observed in PlayPraetor malware campaigns where social media hijacked fraudulent ad distributions.

The CTM360 report also outlines the structured and calculated approaches that attackers use to maximize effectiveness. Victims are initially contacted with mild, non-injectable notifications that gradually escalate with urgency and severity. Initial notifications may refer to general policy violations, but subsequent messages warn you of immediate suspension or permanent deletion of your account. This progressive escalation creates anxiety and urgency, encouraging users to act quickly without fully verifying the reliability of these messages.

To protect against this threat, the CTM360 recommends:

Manage your business social media accounts using only official devices. Use an individual business-only email address. Enables two-factor authentication (2FA). Check your account security settings and active sessions regularly. Train staff to recognize and report suspicious messages.

This extensive phishing campaign highlights the importance of vigilance and proactive security measures to protect valuable online assets.

Did you find this article interesting? This article is a donation from one of our precious partners. Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDid the US flutter first in the tariff war with China? |Trade War News
Next Article Beneficiaries of AI-driven nuclear construction can collect 50%, according to Evercore ISI
user
  • Website

Related Posts

Samsung Patches CVE-2025-4632 Used for Mirai Botnet deployment via Magicinfo 9 Exploit

May 14, 2025

Bianlian and Ransomexx deploys SAP NetWeaver flaws and deploys Pipemagic Trojan

May 14, 2025

Xinbi Telegram Market is $840 million in crypto crime, romance fraud, North Korean laundry

May 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

AI replaces humans: Klarna replaces 700 employees with AI, slashing the workforce by 40%

Israeli military fire hits South Lebanon base for the first time since ceasefire | Israel attacks Lebanon news

Kids Online Safety Act may return and change the internet

Samsung Patches CVE-2025-4632 Used for Mirai Botnet deployment via Magicinfo 9 Exploit

Trending Posts

Israeli military fire hits South Lebanon base for the first time since ceasefire | Israel attacks Lebanon news

May 14, 2025

As combat resumes in Tripoli, Libya, we are seeking calmness | Conflict News

May 14, 2025

Did the US flutter first in the tariff war with China? |Trade War News

May 14, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

AI replaces humans: Klarna replaces 700 employees with AI, slashing the workforce by 40%

AI infrastructure startup TensorWave raises $100 million to meet the rising demand for AI calculations

DataBricks acquires serverless database startup neon for $1 billion to boost AI agent development

All the steps you can take to make your online bet safer

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.