Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Phishing Attack Targets TikTok Business Accounts

New Phishing Attack Targets TikTok Business Accounts

Posted on March 27, 2026 By CWS

Cybersecurity researchers have identified a new phishing operation targeting TikTok for Business accounts using adversary-in-the-middle (AitM) techniques. According to a recent analysis by Push Security, these accounts are valuable targets due to their potential for misuse in malvertising and malware distribution.

Exploiting TikTok’s Popularity

Push Security has highlighted that TikTok has been misused in the past for spreading malicious links and executing social engineering attacks. Notably, this includes the dissemination of various infostealers like Vidar, StealC, and Aura Stealer. These threats have been delivered through AI-generated videos that pretend to be activation guides for popular software such as Windows, Spotify, and CapCut.

The phishing campaign employs deceptive tactics, enticing users to click on links that lead either to a fake TikTok for Business site or a fraudulent Google Careers page. These pages may also offer users the option to schedule a call, furthering the illusion of legitimacy.

Cloudflare Turnstile Evasion

Despite the varying designs of these phishing pages, their objective remains consistent: to bypass security measures by utilizing a Cloudflare Turnstile check. This step is crucial as it prevents automated systems from detecting the malicious content of the pages, ultimately leading victims to a login page meant to capture their credentials.

The campaign employs several domains to host these phishing pages, including:

  • welcome.careerscrews[.]com
  • welcome.careerstaffer[.]com
  • welcome.careersworkflow[.]com
  • welcome.careerstransform[.]com
  • welcome.careersupskill[.]com

SVG Files as a Threat Vector

In a related development, WatchGuard has reported another phishing operation leveraging Scalable Vector Graphics (SVG) files to spread malware, particularly targeting users in Venezuela. The SVG files, disguised as invoices or budgets, contain URLs that download malicious software.

These files exploit ja.cat to shorten URLs from legitimate domains with vulnerabilities, allowing redirection to harmful websites. The resultant malware, written in Go, shares similarities with the BianLian ransomware previously identified by SecurityScorecard in early 2024.

This ongoing campaign underlines the need for vigilance, as even seemingly benign file types like SVGs can introduce significant cybersecurity risks. The deceptive use of SVG attachments in phishing emails highlights the evolving tactics of cybercriminals.

As digital threats become more sophisticated, organizations and individuals must remain alert to protect against these advanced phishing schemes that seek to compromise personal and business data.

The Hacker News Tags:AiTM, Cloudflare, Cybersecurity, Malvertising, Malware, Phishing, Ransomware, social media, SVG files, TikTok

Post navigation

Previous Post: Cyberattack Targets South Asian Financial Firm with Custom Malware
Next Post: OpenAI Introduces Bug Bounty for AI Safety Risks

Related Posts

Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics The Hacker News
VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSX VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSX The Hacker News
GlassWorm Attack Exploits Open VSX Extensions to Target Developers GlassWorm Attack Exploits Open VSX Extensions to Target Developers The Hacker News
Fortinet Exploits, RedLine Clipjack, NTLM Crack, Copilot Attack & More Fortinet Exploits, RedLine Clipjack, NTLM Crack, Copilot Attack & More The Hacker News
Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations The Hacker News
Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Pro-Iranian Group Hacks FBI Director’s Account
  • Critical Malware Alert for Popular Linux Compression Tool
  • Critical Open VSX Bug Fixed in VS Code Extension Security
  • Silver Fox Targets Japanese Firms with Tax Phishing Scheme
  • Cybersecurity Highlights: Recruiter Scam, Anti-Deepfake Tech

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Pro-Iranian Group Hacks FBI Director’s Account
  • Critical Malware Alert for Popular Linux Compression Tool
  • Critical Open VSX Bug Fixed in VS Code Extension Security
  • Silver Fox Targets Japanese Firms with Tax Phishing Scheme
  • Cybersecurity Highlights: Recruiter Scam, Anti-Deepfake Tech

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark