Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Phishing Attack Targets TikTok Business Accounts

New Phishing Attack Targets TikTok Business Accounts

Posted on March 27, 2026 By CWS

Cybersecurity researchers have identified a new phishing operation targeting TikTok for Business accounts using adversary-in-the-middle (AitM) techniques. According to a recent analysis by Push Security, these accounts are valuable targets due to their potential for misuse in malvertising and malware distribution.

Exploiting TikTok’s Popularity

Push Security has highlighted that TikTok has been misused in the past for spreading malicious links and executing social engineering attacks. Notably, this includes the dissemination of various infostealers like Vidar, StealC, and Aura Stealer. These threats have been delivered through AI-generated videos that pretend to be activation guides for popular software such as Windows, Spotify, and CapCut.

The phishing campaign employs deceptive tactics, enticing users to click on links that lead either to a fake TikTok for Business site or a fraudulent Google Careers page. These pages may also offer users the option to schedule a call, furthering the illusion of legitimacy.

Cloudflare Turnstile Evasion

Despite the varying designs of these phishing pages, their objective remains consistent: to bypass security measures by utilizing a Cloudflare Turnstile check. This step is crucial as it prevents automated systems from detecting the malicious content of the pages, ultimately leading victims to a login page meant to capture their credentials.

The campaign employs several domains to host these phishing pages, including:

  • welcome.careerscrews[.]com
  • welcome.careerstaffer[.]com
  • welcome.careersworkflow[.]com
  • welcome.careerstransform[.]com
  • welcome.careersupskill[.]com

SVG Files as a Threat Vector

In a related development, WatchGuard has reported another phishing operation leveraging Scalable Vector Graphics (SVG) files to spread malware, particularly targeting users in Venezuela. The SVG files, disguised as invoices or budgets, contain URLs that download malicious software.

These files exploit ja.cat to shorten URLs from legitimate domains with vulnerabilities, allowing redirection to harmful websites. The resultant malware, written in Go, shares similarities with the BianLian ransomware previously identified by SecurityScorecard in early 2024.

This ongoing campaign underlines the need for vigilance, as even seemingly benign file types like SVGs can introduce significant cybersecurity risks. The deceptive use of SVG attachments in phishing emails highlights the evolving tactics of cybercriminals.

As digital threats become more sophisticated, organizations and individuals must remain alert to protect against these advanced phishing schemes that seek to compromise personal and business data.

The Hacker News Tags:AiTM, Cloudflare, Cybersecurity, Malvertising, Malware, Phishing, Ransomware, social media, SVG files, TikTok

Post navigation

Previous Post: Cyberattack Targets South Asian Financial Firm with Custom Malware
Next Post: OpenAI Introduces Bug Bounty for AI Safety Risks

Related Posts

Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers The Hacker News
China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 The Hacker News
STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware The Hacker News
Zero Trust Data Movement: The Overlooked Challenge Zero Trust Data Movement: The Overlooked Challenge The Hacker News
China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks The Hacker News
AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Checkmarx Jenkins Plugin Compromised by TeamPCP
  • Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading
  • Critical cPanel Vulnerability Exploited by Cybercriminals
  • AI-Powered Zero-Day Exploits Raise Cybersecurity Concerns
  • Frame Security Launches with $50M for AI Cyber Training

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Checkmarx Jenkins Plugin Compromised by TeamPCP
  • Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading
  • Critical cPanel Vulnerability Exploited by Cybercriminals
  • AI-Powered Zero-Day Exploits Raise Cybersecurity Concerns
  • Frame Security Launches with $50M for AI Cyber Training

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark