Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Bion and Ransomexx Exploit SAP Netweaver Nafice for deploying Pipemagic Trojan

May 14, 2025

Samsung Patches Cve-2025-4632 used to deploy Mirai Botnet via Magicinfo 9 Exploit

May 14, 2025

Telegram Xinbi market associated with $ 8.4 billion in crystance, Romance scams, North Korea laundering

May 14, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » CTM360 determines the splash of phishing attacks, focused on meta -bizes -users
Global Security

CTM360 determines the splash of phishing attacks, focused on meta -bizes -users

AdminBy AdminMay 14, 2025No Comments3 Mins Read
Phishing Attacks
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


May 14, 2025Hacker NewsPhishing / malicious software

Phishing -Napada

A new global phishing threat called “Meta -ming“A business-based Meta business is found to be focused on the abduction of high cost accounts, including those who manage advertising and official brand pages.

Cybersecurity researchers at the address CTM360 It turned out that the attackers Meta Mirage represent themselves the official metruce, deceiving the users to transfer sensitive details such as passwords and security codes (OTP).

The scale of this operation is anxious. Researchers have already identified 14,000 malicious URLAs for most of which—Ae 78% –At the time of the publication, the report was not blocked by browsers.

Cybercriminals deftly placed fake pages that use reliable cloud platforms such as Github, Firebase and Vercel, which complicates scammers. This method is closely consistent with the recent conclusions of Microsoft, which emphasize similar abuse of hosting cloud services to compromise Kubernetes applications, emphasizing how attackers often use trusted platforms to avoid detection.

Attackers deploy fake policy violations, suspension of accounts, or urgent verification reports. These messages sent by email and direct messages look convincing as they mimic official messages with meta, often look relevant and reputable. This tactical technique reflects the methods observed in a recent Google Sites phishing company, which used real pages held in Google to cheat users.

Two basic methods are used:

  • Accounting data: Victims introduce passwords and OTP on realistic fake sites. The attackers intentionally cause fake error messages, causing users to introduce their data again, providing accurate and useful stolen information.
  • Theft of cookies: The scammers also steal the brown cookies, allowing them to continue access to the violated accounts even without passwords.

These compromised accounts are not easy to affect PlayPraetor Malware Campany This is hidden in social media for fraudulent advertising distribution.

The CTM360 report also outlines a structured and calculated approach used by attackers for maximum efficiency. The victims initially resort to light, non -compared notifications, which gradually grow into outline and burden. Initial messages may mention violations of general policy, while subsequent messages warn about immediate suspension or permanent account deletion. This gradual escalation is anxious and urgency, forcing users to act quickly, not carefully checking the authenticity of these messages.

To protect against this threat, Recommends CTM360:

  • Only use official tools to manage business accounts on social media.
  • Use individual email addresses only for business.
  • Include two -factor authentication (2FA).
  • Regularly review your account security settings and active sessions.
  • Train staff to recognize and report suspicious messages.

This extensive phishing campaign emphasizes the importance of vigilance and active security measures to protect valuable internet assets.

Found this article interesting? This article is a contribution to one of our esteemed partners. Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Bion and Ransomexx Exploit SAP Netweaver Nafice for deploying Pipemagic Trojan

May 14, 2025

Samsung Patches Cve-2025-4632 used to deploy Mirai Botnet via Magicinfo 9 Exploit

May 14, 2025

Telegram Xinbi market associated with $ 8.4 billion in crystance, Romance scams, North Korea laundering

May 14, 2025

Hoabot malicious programs target 6 Latin American

May 14, 2025

Why does the Security Antainment benefit all your security team

May 14, 2025

Earth AMIT BRIGHT BEHIND CHAPTERS DRUMBERS via ERP in Venom, Tidrone Company

May 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Bion and Ransomexx Exploit SAP Netweaver Nafice for deploying Pipemagic Trojan

May 14, 2025

Samsung Patches Cve-2025-4632 used to deploy Mirai Botnet via Magicinfo 9 Exploit

May 14, 2025

Telegram Xinbi market associated with $ 8.4 billion in crystance, Romance scams, North Korea laundering

May 14, 2025

Hoabot malicious programs target 6 Latin American

May 14, 2025

CTM360 determines the splash of phishing attacks, focused on meta -bizes -users

May 14, 2025

Why does the Security Antainment benefit all your security team

May 14, 2025

Earth AMIT BRIGHT BEHIND CHAPTERS DRUMBERS via ERP in Venom, Tidrone Company

May 14, 2025

Microsoft corrected 78 flaws, 5 zero days operated; CVSS 10 bugs affect the Azure Devops server

May 14, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Bion and Ransomexx Exploit SAP Netweaver Nafice for deploying Pipemagic Trojan

May 14, 2025

Samsung Patches Cve-2025-4632 used to deploy Mirai Botnet via Magicinfo 9 Exploit

May 14, 2025

Telegram Xinbi market associated with $ 8.4 billion in crystance, Romance scams, North Korea laundering

May 14, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.