Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Phishing Attack Targets TikTok Business Accounts

New Phishing Attack Targets TikTok Business Accounts

Posted on March 27, 2026 By CWS

Cybersecurity researchers have identified a new phishing operation targeting TikTok for Business accounts using adversary-in-the-middle (AitM) techniques. According to a recent analysis by Push Security, these accounts are valuable targets due to their potential for misuse in malvertising and malware distribution.

Exploiting TikTok’s Popularity

Push Security has highlighted that TikTok has been misused in the past for spreading malicious links and executing social engineering attacks. Notably, this includes the dissemination of various infostealers like Vidar, StealC, and Aura Stealer. These threats have been delivered through AI-generated videos that pretend to be activation guides for popular software such as Windows, Spotify, and CapCut.

The phishing campaign employs deceptive tactics, enticing users to click on links that lead either to a fake TikTok for Business site or a fraudulent Google Careers page. These pages may also offer users the option to schedule a call, furthering the illusion of legitimacy.

Cloudflare Turnstile Evasion

Despite the varying designs of these phishing pages, their objective remains consistent: to bypass security measures by utilizing a Cloudflare Turnstile check. This step is crucial as it prevents automated systems from detecting the malicious content of the pages, ultimately leading victims to a login page meant to capture their credentials.

The campaign employs several domains to host these phishing pages, including:

  • welcome.careerscrews[.]com
  • welcome.careerstaffer[.]com
  • welcome.careersworkflow[.]com
  • welcome.careerstransform[.]com
  • welcome.careersupskill[.]com

SVG Files as a Threat Vector

In a related development, WatchGuard has reported another phishing operation leveraging Scalable Vector Graphics (SVG) files to spread malware, particularly targeting users in Venezuela. The SVG files, disguised as invoices or budgets, contain URLs that download malicious software.

These files exploit ja.cat to shorten URLs from legitimate domains with vulnerabilities, allowing redirection to harmful websites. The resultant malware, written in Go, shares similarities with the BianLian ransomware previously identified by SecurityScorecard in early 2024.

This ongoing campaign underlines the need for vigilance, as even seemingly benign file types like SVGs can introduce significant cybersecurity risks. The deceptive use of SVG attachments in phishing emails highlights the evolving tactics of cybercriminals.

As digital threats become more sophisticated, organizations and individuals must remain alert to protect against these advanced phishing schemes that seek to compromise personal and business data.

The Hacker News Tags:AiTM, Cloudflare, Cybersecurity, Malvertising, Malware, Phishing, Ransomware, social media, SVG files, TikTok

Post navigation

Previous Post: Cyberattack Targets South Asian Financial Firm with Custom Malware
Next Post: OpenAI Introduces Bug Bounty for AI Safety Risks

Related Posts

Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments The Hacker News
New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards The Hacker News
Cybersecurity Updates: Qualcomm Flaw and iOS Exploit Chains Cybersecurity Updates: Qualcomm Flaw and iOS Exploit Chains The Hacker News
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks The Hacker News
New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials The Hacker News
Why Organizations Are Turning to RPAM Why Organizations Are Turning to RPAM The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity Highlights: Recruiter Scam, Anti-Deepfake Tech
  • Southeast Asian Government Targeted in Cyber Espionage Campaign
  • OpenAI Introduces Bug Bounty for AI Safety Risks
  • New Phishing Attack Targets TikTok Business Accounts
  • Cyberattack Targets South Asian Financial Firm with Custom Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity Highlights: Recruiter Scam, Anti-Deepfake Tech
  • Southeast Asian Government Targeted in Cyber Espionage Campaign
  • OpenAI Introduces Bug Bounty for AI Safety Risks
  • New Phishing Attack Targets TikTok Business Accounts
  • Cyberattack Targets South Asian Financial Firm with Custom Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark