Trustwave analysts uncover phishing attacks using Facebook posts

December 16, 2022

Trustwave analysts have discovered a new phishing campaign that takes advantage of Facebook posts to trick users into disclosing their account credentials and personally identifiable information (PII).

The attack starts with emails posing as a copyright infringement issue on a Facebook post, followed by a threat to delete their account within 48 hours if they do not file an appeal. Because the appeal link is a genuine Facebook post, threat actors can avoid email security solutions and ensure their phishing messages reach the target’s inbox. This post, however, contains a link to an external phishing site.

The phishing sites are meticulously designed to resemble Facebook’s legitimate copyright appeal page, complete with a form in which victims are asked to enter their full name, email address, phone number, and Facebook username.

When this information is submitted, the page collects the victim’s IP address and geolocation information, as well as additional information to circumvent fingerprinting protections or security questions, while taking over the victim’s Facebook account and exfiltrating everything to the threat actor’s Telegram account.

In the meantime, the victim is redirected to the next phishing page, which displays a bogus 6-digit one-time password (OTP) request with a timer. Any code entered by the victim will generate an error, and if the ‘Need another way to authenticate?’ button is clicked, the site will redirect to the actual Facebook site, granting the threat actors access to the account.

The sources for this piece include an article in BleepingComputer.

Top Stories

Related Articles

April 17, 2026 Booking.com has confirmed a data breach exposing customer booking details and contact information, prompting warnings about a more...

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn