Clickbait to Catastrophe: How a Fake Meta Email Leads to Password Plunder
NetmanageIT OpenCTI - opencti.netmanageit.com

SUMMARY :
A sophisticated phishing campaign targeting Meta Business accounts has been uncovered by the Cofense Phishing Defense Center. The attack begins with a fake Instagram alert claiming the user's ads are suspended due to policy violations. Victims are directed to a fraudulent page mimicking Meta's business help center, where they're prompted to interact with a fake chat support or follow step-by-step instructions. The ultimate goal is to trick users into adding the attacker's device as a secure login method via Two-Factor Authentication, effectively hijacking the account. The campaign employs convincing email templates, landing pages, and even includes live agent support to add credibility. Users are urged to verify communications and examine URLs carefully before taking action to protect their social media credentials.
OPENCTI LABELS :
phishing,credential theft,social media,instagram,two-factor authentication,meta,chat support,business accounts
Open in NetmanageIT OpenCTI Public Instance with below link!
Use public read only username and password on login page.
NOTE : Use Public READ only user credentials on login page banner.
Clickbait to Catastrophe: How a Fake Meta Email Leads to Password Plunder