A new global phishing threat called “Meta -ming“A business-based Meta business is found to be focused on the abduction of high cost accounts, including those who manage advertising and official brand pages.
Cybersecurity researchers at the address CTM360 It turned out that the attackers Meta Mirage represent themselves the official metruce, deceiving the users to transfer sensitive details such as passwords and security codes (OTP).
The scale of this operation is anxious. Researchers have already identified 14,000 malicious URLAs for most of which—Ae 78% –At the time of the publication, the report was not blocked by browsers.
Cybercriminals deftly placed fake pages that use reliable cloud platforms such as Github, Firebase and Vercel, which complicates scammers. This method is closely consistent with the recent conclusions of Microsoft, which emphasize similar abuse of hosting cloud services to compromise Kubernetes applications, emphasizing how attackers often use trusted platforms to avoid detection.
Attackers deploy fake policy violations, suspension of accounts, or urgent verification reports. These messages sent by email and direct messages look convincing as they mimic official messages with meta, often look relevant and reputable. This tactical technique reflects the methods observed in a recent Google Sites phishing company, which used real pages held in Google to cheat users.
Two basic methods are used:
- Accounting data: Victims introduce passwords and OTP on realistic fake sites. The attackers intentionally cause fake error messages, causing users to introduce their data again, providing accurate and useful stolen information.
- Theft of cookies: The scammers also steal the brown cookies, allowing them to continue access to the violated accounts even without passwords.
These compromised accounts are not easy to affect PlayPraetor Malware Campany This is hidden in social media for fraudulent advertising distribution.
The CTM360 report also outlines a structured and calculated approach used by attackers for maximum efficiency. The victims initially resort to light, non -compared notifications, which gradually grow into outline and burden. Initial messages may mention violations of general policy, while subsequent messages warn about immediate suspension or permanent account deletion. This gradual escalation is anxious and urgency, forcing users to act quickly, not carefully checking the authenticity of these messages.
To protect against this threat, Recommends CTM360:
- Only use official tools to manage business accounts on social media.
- Use individual email addresses only for business.
- Include two -factor authentication (2FA).
- Regularly review your account security settings and active sessions.
- Train staff to recognize and report suspicious messages.
This extensive phishing campaign emphasizes the importance of vigilance and active security measures to protect valuable internet assets.