By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users
Computing

CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users

News Room
Last updated: 2025/05/14 at 10:27 AM
News Room Published 14 May 2025
Share
SHARE

May 14, 2025The Hacker NewsPhishing / Malware

A new global phishing threat called “Meta Mirage” has been uncovered, targeting businesses using Meta’s Business Suite. This campaign specifically aims at hijacking high-value accounts, including those managing advertising and official brand pages.

Cybersecurity researchers at CTM360 revealed that attackers behind Meta Mirage impersonate official Meta communications, tricking users into handing over sensitive details like passwords and security codes (OTP).

The scale of this operation is alarming. Researchers have already identified over 14,000 malicious URLs, a concerning majority of which—nearly 78%—were not blocked by browsers at the time the report was published.

Cybercriminals cleverly hosted fake pages leveraging trusted cloud platforms like GitHub, Firebase, and Vercel, making it harder to spot the scams. This method aligns closely with recent findings from Microsoft, which highlighted similar abuse of cloud hosting services to compromise Kubernetes applications, emphasizing how attackers frequently leverage trusted platforms to evade detection.

The attackers deploy fake alerts about policy violations, account suspensions, or urgent verification notices. These messages, sent via email and direct messages, look convincing because they mimic official communications from Meta, often appearing urgent and authoritative. This tactic mirrors techniques observed in the recent Google Sites phishing campaign, which used authentic-looking Google-hosted pages to deceive users.

Two main methods are being used:

  • Credential Theft: Victims enter passwords and OTPs into realistic-looking fake websites. The attackers deliberately trigger fake error messages, causing users to re-enter their details, ensuring accurate and usable stolen information.
  • Cookie Theft: Scammers also steal browser cookies, allowing them continued access to compromised accounts even without passwords.

These compromised accounts don’t just affect individual businesses—they’re often exploited to run malicious advertising campaigns, further amplifying damage, similar to tactics observed in the PlayPraetor malware campaign that hijacked social media accounts for fraudulent ad distribution.

CTM360’s report also outlines a structured and calculated approach used by the attackers to maximize effectiveness. Victims are initially contacted with mild, non-alarming notifications that progressively escalate in urgency and severity. Initial notices might mention generic policy violations, while subsequent messages warn of immediate suspensions or permanent deletion of accounts. This incremental escalation induces anxiety and urgency, driving users to act quickly without thoroughly verifying the authenticity of these messages.

To protect against this threat, CTM360 recommends:

  • Only use official devices to manage business social media accounts.
  • Use separate business-only email addresses.
  • Enable Two-Factor Authentication (2FA).
  • Regularly review account security settings and active sessions.
  • Train staff to recognize and report suspicious messages.

This widespread phishing campaign underscores the importance of vigilance and proactive security measures to protect valuable online assets.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Bitcoin (BTC) Approaches the $105,000 Mark, But Analysts Predict Ruvi AI (RUVI) Will Hit $2.00 and Grow by 20,000% in 2025
Next Article Constellation Software’s (TSE:CSU) investors will be pleased with their stellar 290% return over the last five years
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Neon Serverless Postgres Now Generally Available as an Azure Native Integration
News
11 Best Document Collaboration Software for Teams in 2025
Computing
La Liga Soccer Livestream: How to Watch Real Madrid vs. Mallorca From Anywhere
News
A Survey of Digital Twin Applications Across Domains | HackerNoon
Computing

You Might also Like

Computing

11 Best Document Collaboration Software for Teams in 2025

31 Min Read
Computing

A Survey of Digital Twin Applications Across Domains | HackerNoon

6 Min Read
Computing

Grocery delivery firm Dingdong Maicai becomes latest Chinese company to enter Saudi market · TechNode

1 Min Read
Computing

How to Create Copilot Prompts with 10 Examples |

23 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?