Trustwave analysts have discovered a new phishing campaign that takes advantage of Facebook posts to trick users into disclosing their account credentials and personally identifiable information (PII).
The attack starts with emails posing as a copyright infringement issue on a Facebook post, followed by a threat to delete their account within 48 hours if they do not file an appeal. Because the appeal link is a genuine Facebook post, threat actors can avoid email security solutions and ensure their phishing messages reach the target’s inbox. This post, however, contains a link to an external phishing site.
The phishing sites are meticulously designed to resemble Facebook’s legitimate copyright appeal page, complete with a form in which victims are asked to enter their full name, email address, phone number, and Facebook username.
When this information is submitted, the page collects the victim’s IP address and geolocation information, as well as additional information to circumvent fingerprinting protections or security questions, while taking over the victim’s Facebook account and exfiltrating everything to the threat actor’s Telegram account.
In the meantime, the victim is redirected to the next phishing page, which displays a bogus 6-digit one-time password (OTP) request with a timer. Any code entered by the victim will generate an error, and if the ‘Need another way to authenticate?’ button is clicked, the site will redirect to the actual Facebook site, granting the threat actors access to the account.
The sources for this piece include an article in BleepingComputer.