Trustwave analysts uncover phishing attacks using Facebook posts

Share post:

Trustwave analysts have discovered a new phishing campaign that takes advantage of Facebook posts to trick users into disclosing their account credentials and personally identifiable information (PII).

The attack starts with emails posing as a copyright infringement issue on a Facebook post, followed by a threat to delete their account within 48 hours if they do not file an appeal. Because the appeal link is a genuine Facebook post, threat actors can avoid email security solutions and ensure their phishing messages reach the target’s inbox. This post, however, contains a link to an external phishing site.

The phishing sites are meticulously designed to resemble Facebook’s legitimate copyright appeal page, complete with a form in which victims are asked to enter their full name, email address, phone number, and Facebook username.

When this information is submitted, the page collects the victim’s IP address and geolocation information, as well as additional information to circumvent fingerprinting protections or security questions, while taking over the victim’s Facebook account and exfiltrating everything to the threat actor’s Telegram account.

In the meantime, the victim is redirected to the next phishing page, which displays a bogus 6-digit one-time password (OTP) request with a timer. Any code entered by the victim will generate an error, and if the ‘Need another way to authenticate?’ button is clicked, the site will redirect to the actual Facebook site, granting the threat actors access to the account.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Cyber Security Today, May 15, 2024 – Ebury botnet still exploits Linux servers, Microsoft, SAP and Apple issue security updates

The Ebury botnet continues to exploit Linux servers, Microsoft, SAP and Apple issue security updates, and more. Welcome to...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways