By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion
Computing

AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion

News Room
Last updated: 2026/04/01 at 6:09 AM
News Room Published 1 April 2026
Share
AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion
SHARE

Ravie LakshmananMar 27, 2026Ransomware / Malware

Threat actors are using adversary-in-the-middle (AitM) phishing pages to seize control of TikTok for Business accounts in a new campaign, according to a report from Push Security.

Business accounts associated with social media platforms are a lucrative target, as they can be weaponized by bad actors for malvertising and distributing malware.

“TikTok has been historically abused to distribute malicious links and social engineering instructions,” Push Security said. “This includes multiple infostealers like Vidar, StealC, and Aura Stealer delivered via ClickFix-style instructions with AI-generated videos posed as activation guides for Windows, Spotify, and CapCut.”

The campaign begins with tricking victims into clicking on a malicious link that directs them to either a lookalike page impersonating TikTok for Business or a page that’s designed to impersonate Google Careers, along with an option to schedule a call to discuss the opportunity.

It’s worth noting that a prior iteration of this credential phishing campaign was flagged by Sublime Security in October 2025, with emails masquerading as outreach messages used as a social engineering tactic.

Regardless of the type of page served, the end goal is the same: perform a Cloudflare Turnstile check to block bots and automated scanners from analyzing the contents of the page and serve a malicious AitM phishing page login page that’s designed to steal their credentials.

The phishing pages are hosted on the following domains –

  • welcome.careerscrews[.]com
  • welcome.careerstaffer[.]com
  • welcome.careersworkflow[.]com
  • welcome.careerstransform[.]com
  • welcome.careersupskill[.]com
  • welcome.careerssuccess[.]com
  • welcome.careersstaffgrid[.]com
  • welcome.careersprogress[.]com
  • welcome.careersgrower[.]com
  • welcome.careersengage[.]com
  • welcome.careerscrews[.]com

The development comes as another phishing campaign has been observed using Scalable Vector Graphics (SVG) file attachments to deliver malware to targets located in Venezuela.

According to a report published by WatchGuard, the messages have SVG files with file names in Spanish, masquerading as invoices, receipts, or budgets. 

“When these malicious SVGs are opened, they communicate with a URL that downloads the malicious artifact,” the company said. “This campaign uses ja.cat to shorten URLs from legitimate domains that have a vulnerability that allows redirects to any URL, so they point to the original domain where the malware is downloaded.”

The downloaded artifact is a malware written in Go that shares overlaps with a BianLian ransomware sample detailed by SecurityScorecard in January 2024.

“This campaign is a strong reminder that even seemingly harmless file types like SVGs can be used to deliver serious threats,” WatchGuard said. “In this case, malicious SVG attachments were used to initiate a phishing chain that led to malware delivery associated with BianLian activity.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Toyota’s Woven Capital appoints new CIO and COO in push for finding the ‘future of mobility’ |  News Toyota’s Woven Capital appoints new CIO and COO in push for finding the ‘future of mobility’ | News
Next Article The new competitive advantage – UKTN The new competitive advantage – UKTN
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Do you have solar panels? The State will buy your electricity 4 times cheaper
Do you have solar panels? The State will buy your electricity 4 times cheaper
Mobile
Caution: In these cases you must switch off your cell phone immediately!
Caution: In these cases you must switch off your cell phone immediately!
News
Northrop Grumman unveils a shocking video of its futuristic fighter
Northrop Grumman unveils a shocking video of its futuristic fighter
Computing
As we look to the Middle East, the Arctic has become the hiding place for Russia’s biggest challenge to NATO: Borei and Yasen
As we look to the Middle East, the Arctic has become the hiding place for Russia’s biggest challenge to NATO: Borei and Yasen
Gaming

You Might also Like

Northrop Grumman unveils a shocking video of its futuristic fighter
Computing

Northrop Grumman unveils a shocking video of its futuristic fighter

5 Min Read
Can a planetary system change on the scale of a human lifetime?
Computing

Can a planetary system change on the scale of a human lifetime?

3 Min Read
The terrifying double-dealing of a ransomware negotiator
Computing

The terrifying double-dealing of a ransomware negotiator

2 Min Read
How is China outperforming Europe on electronic recycling?
Computing

How is China outperforming Europe on electronic recycling?

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?