• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » security » Phishing for Corporate Social Media Logins Up 60% in 2 Months

Phishing for Corporate Social Media Logins Up 60% in 2 Months

2020-06-26 by Michelle Dvorak

Social media phishing

Hackers Using Impersonation Scams and Phishing Emails to Hack into Corporate Social Media Accounts

Hackers are sending phishing emails that impersonate major social media channels to steal corporate targets. The emails urge the recipient to take immediate action to avoid account suspension or deletion. The targets of these scams are large corporate users in media conglomerates, talent agencies, print and digital services, and hospitality sectors. In the past two months, the attacks have increased 60 percent says a report by Abnormal Security.

If the hackers are able to gain access to these enterprise-level social media accounts they’ll be able to hijack or delete the account. They may then access and message all of the account’s followers.

Emails that look like they come from Instagram, Facebook, and Twitter are being used in email phishing campaigns. The goal is to steal login credentials. The emails claim that the victim has violated a platform policy or copyright law and threatens them with account suspension or deletion. The email phishing campaigns contain a malicious link disguised is a link to appeal the suspension.

READ: NCSC Reports 1M Phishing Emails in Last 60 Days

Like most email phishing scams, the target is urged to act immediately to avoid some sort of negative action if they don’t follow the instructions in the email. If the email recipient clicks on the link in the phishing email, they are taken to a spoof web page that prompts them to enter their account login credentials. The spoof landing pages look almost identical to their legitimate counterparts.

“Abnormal Security has observed attackers impersonating of social media platforms like Instagram, Facebook, and Twitter to steal the login credentials of employees major enterprise organizations. In the past two months, we have seen a 60% increase for several organizations with key social media presences,” says Abnormal Security

Earlier this month, hackers were spotted using Office 365 to target LinkedIn users with another phishing scam. This campaign attempted to steal LinkedIn credentials.  The emails may have compromised up to 50,000 users and if compromised exposes all of their contacts to the hackers.

This week, phishing scams were reported circulating on WhatsApp. In this scam, the hackers are sending fake tech support messages using the native messaging platform. They then prompt the victim to send their account PIN code. IF the user does so, the hacker can hijack their WhatsApp account or access all of their contacts.

In the following phishing email scams, the users are threatened with account deletion or suspension.

Instagram Phishing

In this Instagram phishing scam, an email is sent to the target claiming the account has a copyright violation. The target is urged to click on a link to appeal the decision. The target is threatened with account deletion if they do not comply with the instructions. If the target clicks on the link in the phishing email, they are taken to a spoof website that prompts them to enter in their Instagram login information. The domain may, at a glance, appear that it is an official Instagram support website, but it is clearly not. The spoof website, Instagram.suppercenter.ml, is used to phish targets for their account logins.

Facebook Phishing Scam

Abnormal Security has also spotted Facebook phishing emails. The hackers use an email address which appears to come from Facebook itself. The email messaging claims that the users Facebook has received a high number of complaints. Again, the recipient is urged to appeal immediately, or their company Facebook page may be unpublished.

The Facebook phishing email works differently than the Instagram version. Rather than taking the user to a spoof website, the malicious link leads the target to a Facebook notes page – which is hosted on Facebook itself. Because notes forms are a Facebook feature, the target must already be logged in to see the notes form. They are prompted to enter the email address used for the account.

Twitter Email Phishing

Just like the Instagram phishing email, the Twitter phishing email also claims that the target’s account has violated a Twitter policy. The target is again urged to click on a link to appeal the decision. The email address used for the phishing email was chosen by the hackers because it looks very similar to the official Twitter domain name. The emails come from a domain name the hackers registered  – with only one letter difference from the official Twitter.com URL. The letter “i” in Twitter is replaced with a lower-case “L. – so the email comes from  “Twltter” URL rather than the legitimate “Twitter.” See the difference? It’s VERY hard to spot!

In these attacks, Instagram, Facebook, and Twitter all being used to steal company social media account login information. The goal of the hackers is to hijack social media accounts that are very valuable to enterprise corporations.

Filed Under: security Tagged With: Facebook, Instagram, Twitter

About Michelle Dvorak

Michelle writes about cyber security, data privacy focusing on social media privacy as well as how to protect your IoT devices. She has worked in internet technology for over 20 years and owns METRONY, LLC. Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. Michelle published a guide to Cyber Security for Business Travelers


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version