Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Phishing Attack Targets TikTok Business Accounts

New Phishing Attack Targets TikTok Business Accounts

Posted on March 27, 2026 By CWS

Cybersecurity researchers have identified a new phishing operation targeting TikTok for Business accounts using adversary-in-the-middle (AitM) techniques. According to a recent analysis by Push Security, these accounts are valuable targets due to their potential for misuse in malvertising and malware distribution.

Exploiting TikTok’s Popularity

Push Security has highlighted that TikTok has been misused in the past for spreading malicious links and executing social engineering attacks. Notably, this includes the dissemination of various infostealers like Vidar, StealC, and Aura Stealer. These threats have been delivered through AI-generated videos that pretend to be activation guides for popular software such as Windows, Spotify, and CapCut.

The phishing campaign employs deceptive tactics, enticing users to click on links that lead either to a fake TikTok for Business site or a fraudulent Google Careers page. These pages may also offer users the option to schedule a call, furthering the illusion of legitimacy.

Cloudflare Turnstile Evasion

Despite the varying designs of these phishing pages, their objective remains consistent: to bypass security measures by utilizing a Cloudflare Turnstile check. This step is crucial as it prevents automated systems from detecting the malicious content of the pages, ultimately leading victims to a login page meant to capture their credentials.

The campaign employs several domains to host these phishing pages, including:

  • welcome.careerscrews[.]com
  • welcome.careerstaffer[.]com
  • welcome.careersworkflow[.]com
  • welcome.careerstransform[.]com
  • welcome.careersupskill[.]com

SVG Files as a Threat Vector

In a related development, WatchGuard has reported another phishing operation leveraging Scalable Vector Graphics (SVG) files to spread malware, particularly targeting users in Venezuela. The SVG files, disguised as invoices or budgets, contain URLs that download malicious software.

These files exploit ja.cat to shorten URLs from legitimate domains with vulnerabilities, allowing redirection to harmful websites. The resultant malware, written in Go, shares similarities with the BianLian ransomware previously identified by SecurityScorecard in early 2024.

This ongoing campaign underlines the need for vigilance, as even seemingly benign file types like SVGs can introduce significant cybersecurity risks. The deceptive use of SVG attachments in phishing emails highlights the evolving tactics of cybercriminals.

As digital threats become more sophisticated, organizations and individuals must remain alert to protect against these advanced phishing schemes that seek to compromise personal and business data.

The Hacker News Tags:AiTM, Cloudflare, Cybersecurity, Malvertising, Malware, Phishing, Ransomware, social media, SVG files, TikTok

Post navigation

Previous Post: Cyberattack Targets South Asian Financial Firm with Custom Malware
Next Post: OpenAI Introduces Bug Bounty for AI Safety Risks

Related Posts

Cyber Experts Sentenced for BlackCat Ransomware Crimes Cyber Experts Sentenced for BlackCat Ransomware Crimes The Hacker News
New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands The Hacker News
Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability The Hacker News
OFAC Sanctions North Korean IT Network Exploiting Remote Jobs OFAC Sanctions North Korean IT Network Exploiting Remote Jobs The Hacker News
SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords The Hacker News
Qilin and Warlock Ransomware Exploit Driver Vulnerabilities Qilin and Warlock Ransomware Exploit Driver Vulnerabilities The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading
  • Critical cPanel Vulnerability Exploited by Cybercriminals
  • AI-Powered Zero-Day Exploits Raise Cybersecurity Concerns
  • Frame Security Launches with $50M for AI Cyber Training
  • AI-Powered Zero-Day Exploit Bypasses 2FA Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading
  • Critical cPanel Vulnerability Exploited by Cybercriminals
  • AI-Powered Zero-Day Exploits Raise Cybersecurity Concerns
  • Frame Security Launches with $50M for AI Cyber Training
  • AI-Powered Zero-Day Exploit Bypasses 2FA Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark