Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users

Posted on May 14, 2025May 14, 2025 By CWS

Might 14, 2025The Hacker NewsPhishing / Malware
A brand new international phishing risk known as “Meta Mirage” has been uncovered, focusing on companies utilizing Meta’s Enterprise Suite. This marketing campaign particularly goals at hijacking high-value accounts, together with these managing promoting and official model pages.
Cybersecurity researchers at CTM360 revealed that attackers behind Meta Mirage impersonate official Meta communications, tricking customers into handing over delicate particulars like passwords and safety codes (OTP).
The size of this operation is alarming. Researchers have already recognized over 14,000 malicious URLs, a regarding majority of which—practically 78%—weren’t blocked by browsers on the time the report was revealed.
Cybercriminals cleverly hosted faux pages leveraging trusted cloud platforms like GitHub, Firebase, and Vercel, making it more durable to identify the scams. This methodology aligns carefully with latest findings from Microsoft, which highlighted related abuse of cloud internet hosting companies to compromise Kubernetes purposes, emphasizing how attackers steadily leverage trusted platforms to evade detection.
The attackers deploy faux alerts about coverage violations, account suspensions, or pressing verification notices. These messages, despatched through e-mail and direct messages, look convincing as a result of they mimic official communications from Meta, usually showing pressing and authoritative. This tactic mirrors strategies noticed within the latest Google Websites phishing marketing campaign, which used authentic-looking Google-hosted pages to deceive customers.
Two principal strategies are getting used:

Credential Theft: Victims enter passwords and OTPs into realistic-looking faux web sites. The attackers intentionally set off faux error messages, inflicting customers to re-enter their particulars, guaranteeing correct and usable stolen info.
Cookie Theft: Scammers additionally steal browser cookies, permitting them continued entry to compromised accounts even with out passwords.

These compromised accounts do not simply have an effect on particular person companies—they’re usually exploited to run malicious promoting campaigns, additional amplifying harm, much like ways noticed within the PlayPraetor malware marketing campaign that hijacked social media accounts for fraudulent advert distribution.

CTM360’s report additionally outlines a structured and calculated method utilized by the attackers to maximise effectiveness. Victims are initially contacted with gentle, non-alarming notifications that progressively escalate in urgency and severity. Preliminary notices would possibly point out generic coverage violations, whereas subsequent messages warn of rapid suspensions or everlasting deletion of accounts. This incremental escalation induces nervousness and urgency, driving customers to behave shortly with out totally verifying the authenticity of those messages.
To guard towards this risk, CTM360 recommends:

Solely use official gadgets to handle enterprise social media accounts.
Use separate business-only e-mail addresses.
Allow Two-Issue Authentication (2FA).
Recurrently evaluation account safety settings and lively periods.
Practice workers to acknowledge and report suspicious messages.

This widespread phishing marketing campaign underscores the significance of vigilance and proactive safety measures to guard beneficial on-line belongings.

Discovered this text attention-grabbing? This text is a contributed piece from one in all our valued companions. Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Attacks, Business, CTM360, Identifies, Meta, Phishing, Surge, Targeting, Users

Post navigation

Previous Post: Researchers Detailed New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse
Next Post: Adobe Photoshop Vulnerability Let Attackers Execute Arbitrary Code

Related Posts

Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Customer Accounts The Hacker News
U.K. Police Just Seized £5.5 Billion in Bitcoin — The World’s Largest Crypto Bust The Hacker News
New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station The Hacker News
Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection The Hacker News
Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploits The Hacker News
CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News