FraudHIGH

Fraud Alert - TikTok for Business Accounts Targeted

BCBleepingComputer·Reporting by Bill Toulas
📰 2 sources·Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Updated:
🎯

Basically, scammers are tricking TikTok for Business users into giving up their login details.

Quick Summary

A new phishing campaign is targeting TikTok for Business accounts, risking sensitive data and security. Users should be vigilant against suspicious links and verify domains before entering credentials. Protect your accounts by using passkeys and reporting any suspicious activity.

What Happened

A new phishing campaign is specifically targeting TikTok for Business accounts. This campaign is particularly dangerous as it employs tactics that prevent security bots from analyzing the malicious pages. The attackers are leveraging the high potential for abuse associated with TikTok Business accounts, which can be exploited for malvertising, ad fraud, and spreading malicious content.

The campaign has been linked to previous attacks that targeted Google Ad Manager accounts. This connection suggests a pattern of targeting platforms with significant advertising capabilities, making them attractive to cybercriminals. The phishing pages are hosted on Cloudflare and are designed to look legitimate, which increases the likelihood of victims falling for the scam.

Who's Being Targeted

Business accounts on TikTok are the primary targets of this phishing campaign. These accounts are appealing to attackers due to their perceived legitimacy and extensive reach. Users who log into TikTok using Google's single sign-on (SSO) service are particularly at risk. If compromised, both their TikTok and Google accounts could be hijacked simultaneously, allowing attackers to exploit both platforms for malicious purposes.

The phishing strategy involves luring users to fake pages that impersonate TikTok and Google Careers. By requesting basic information first, the attackers can validate the victim's business email address before leading them to a fake login page designed to capture credentials.

Signs of Infection

Victims may encounter suspicious invites or job offers that lead to these phishing pages. The malicious domains are crafted to mimic legitimate services, making it difficult for users to identify them as threats. Once on the phishing page, users are prompted to enter their credentials, which are then captured by the attackers.

It's crucial for users to be aware of the signs of phishing, such as unusual URLs or requests for sensitive information. The use of two-factor authentication (2FA) does not guarantee safety, as attackers can still hijack accounts through the reverse proxy method employed in this campaign.

How to Protect Yourself

To safeguard against this phishing threat, users should adopt several best practices. Always verify the legitimacy of links before clicking, especially those received from unknown contacts. Checking the domain is essential; if it looks suspicious, avoid entering any credentials.

Additionally, using passkeys can enhance security for valuable accounts. Users should remain cautious and report any suspicious activity to TikTok or their email provider. By staying informed and vigilant, users can better protect themselves from falling victim to this phishing campaign.

🔒 Pro insight: This campaign highlights the increasing sophistication of phishing tactics, especially targeting high-value accounts like those on TikTok for Business.

Original article from

BCBleepingComputer· Bill Toulas
Read Full Article

Also covered by

THThe Hacker News

AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion

Read Article
INInfosecurity Magazine

New Wave of AiTM Phishing Targets TikTok for Business

Read Article

Related Pings

HIGHFraud

Drift Hack - $285 Million Theft Linked to DPRK Operation

A major hack on Drift resulted in a staggering $285 million theft, linked to a six-month DPRK social engineering operation. This highlights the growing threat of state-sponsored cybercrime in the cryptocurrency sector. Organizations must enhance their security measures to prevent similar attacks.

The Hacker News·
HIGHFraud

Device Code Phishing - Attacks Surge 37 Times in 2026

Device code phishing attacks have skyrocketed this year, with a 37x increase. Users of IoT and streaming devices are particularly at risk. New phishing kits like EvilTokens are making these attacks easier for cybercriminals. Stay alert and protect your accounts.

BleepingComputer·
HIGHFraud

Job Scams - Coca-Cola and Ferrari Offers Are Traps

Scammers are impersonating Coca-Cola and Ferrari with fake job offers to steal your passwords. Job seekers are at high risk as these scams become more sophisticated. Protect your personal information by verifying job offers directly with companies.

Malwarebytes Labs·
HIGHFraud

FCC Proposes $4.5 Million Fine for Voxbeam's Fraudulent Calls

The FCC is proposing a hefty fine against Voxbeam for allowing fraudulent calls to reach American consumers. This could lead to stricter regulations on voice service providers. Stay alert to protect your personal information from scams.

The Record·
HIGHFraud

Windows Extortion Plot - Engineer Pleads Guilty to Charges

A former engineer has pleaded guilty to locking Windows admins out of servers in an extortion scheme. This incident underscores the risks of insider threats. Rhyne's actions could lead to a 15-year prison sentence. Companies must strengthen their cybersecurity measures to prevent similar attacks.

BleepingComputer·
MEDIUMFraud

Business Email Compromise - The New Threat Landscape Explained

A recent fraud attempt shows how business email compromise is evolving. Small organizations are now prime targets for these scams. Awareness is key to staying safe.

Cisco Talos Intelligence·