Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users

The Hacker News by The Hacker News
May 14, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


May 14, 2025The Hacker NewsPhishing / Malware

A new global phishing threat called “Meta Mirage” has been uncovered, targeting businesses using Meta’s Business Suite. This campaign specifically aims at hijacking high-value accounts, including those managing advertising and official brand pages.

Cybersecurity researchers at CTM360 revealed that attackers behind Meta Mirage impersonate official Meta communications, tricking users into handing over sensitive details like passwords and security codes (OTP).

The scale of this operation is alarming. Researchers have already identified over 14,000 malicious URLs, a concerning majority of which—nearly 78%—were not blocked by browsers at the time the report was published.

Cybercriminals cleverly hosted fake pages leveraging trusted cloud platforms like GitHub, Firebase, and Vercel, making it harder to spot the scams. This method aligns closely with recent findings from Microsoft, which highlighted similar abuse of cloud hosting services to compromise Kubernetes applications, emphasizing how attackers frequently leverage trusted platforms to evade detection.

The attackers deploy fake alerts about policy violations, account suspensions, or urgent verification notices. These messages, sent via email and direct messages, look convincing because they mimic official communications from Meta, often appearing urgent and authoritative. This tactic mirrors techniques observed in the recent Google Sites phishing campaign, which used authentic-looking Google-hosted pages to deceive users.

Two main methods are being used:

  • Credential Theft: Victims enter passwords and OTPs into realistic-looking fake websites. The attackers deliberately trigger fake error messages, causing users to re-enter their details, ensuring accurate and usable stolen information.
  • Cookie Theft: Scammers also steal browser cookies, allowing them continued access to compromised accounts even without passwords.

These compromised accounts don’t just affect individual businesses—they’re often exploited to run malicious advertising campaigns, further amplifying damage, similar to tactics observed in the PlayPraetor malware campaign that hijacked social media accounts for fraudulent ad distribution.

CTM360’s report also outlines a structured and calculated approach used by the attackers to maximize effectiveness. Victims are initially contacted with mild, non-alarming notifications that progressively escalate in urgency and severity. Initial notices might mention generic policy violations, while subsequent messages warn of immediate suspensions or permanent deletion of accounts. This incremental escalation induces anxiety and urgency, driving users to act quickly without thoroughly verifying the authenticity of these messages.

To protect against this threat, CTM360 recommends:

  • Only use official devices to manage business social media accounts.
  • Use separate business-only email addresses.
  • Enable Two-Factor Authentication (2FA).
  • Regularly review account security settings and active sessions.
  • Train staff to recognize and report suspicious messages.

This widespread phishing campaign underscores the importance of vigilance and proactive security measures to protect valuable online assets.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
VTech Announces FY2025 Annual Results

VTech Announces FY2025 Annual Results

Recommended.

Lenovo To Acquire Infinidat In Huge AI Storage Play

Lenovo To Acquire Infinidat In Huge AI Storage Play

January 16, 2025
Inovativní řešení společnosti Huawei Digital Power pro všechny scénáře tvorby sítě rozsvěcuje Intersolar Europe

Inovativní řešení společnosti Huawei Digital Power pro všechny scénáře tvorby sítě rozsvěcuje Intersolar Europe

May 9, 2025

Trending.

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

October 6, 2025
Cloud Computing on the Rise: Market Projected to Reach .6 Trillion by 2030

Cloud Computing on the Rise: Market Projected to Reach $1.6 Trillion by 2030

August 1, 2025
Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

July 14, 2025
The Ultimate MSP Guide to Structuring and Selling vCISO Services

The Ultimate MSP Guide to Structuring and Selling vCISO Services

February 19, 2025
Translators’ Voices: China shares technological achievements with the world for mutual benefit

Translators’ Voices: China shares technological achievements with the world for mutual benefit

June 3, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio