While the recent Meta outages have grabbed headlines, the latest research from Fortra analysts reveals a chilling development in the cyber threat landscape: a large-scale phishing attack aimed at compromising Meta Business Accounts.
The campaign incorporates several atypical tactics to carry out the attack, including expertly crafted phishing emails, deceptive live support chats, and manipulation of Google notifications and QR codes. Fortra analysts have so far detected thousands of phishing emails associated with this campaign targeting a broad range of industries.
The targeting of Meta for Business brings into focus the high value compromised businesses on social channels hold for cybercriminals. While individual accounts often bear the brunt of such attacks, the ramifications of a breach in a business context are far-reaching, with potentially devastating consequences for both reputation and financial security.
I sent some questions over to Michael Tyler, Senior Director of Security Operations for Fortra to get some more insight on this campaign. Here’s what he said:
Can you describe the campaign and who the targets are?
- Meta Business Suite, also known as Meta for Business, is a set of tools around managing a business’ presence on the Facebook and Instagram platforms. Access to Meta Business Suite is granted through an underlying Facebook or Instagram account. This campaign is leveraging a sophisticated phishing attack in order to obtain access to accounts with access to Meta Business Suite. Targets are organizations of every size. Fortra observed and blocked thousands of threats matching this campaign targeting several dozen organizations over a period of several weeks. In some cases, the phishing emails were sent specifically to members of the marketing team at the organization, indicating that the adversary had done research to know which employees were most likely to have the target credentials.
How novel is the attack that is used by the threat actor(s)?
- The concept of phishing itself is nothing new. However, this campaign had several notable points.
- The first is the impersonation of Meta for Business, combined with the tailored recipient list noticed at some organizations. While not novel in and of itself it indicates that the adversary launching this campaign went to at least some degree of effort to deliver a targeted attack, as opposed to a shotgun style approach typically seen in low-complexity phishing attacks. The hypothesis that this was a tailored attack is also supported by the phishing website itself, which is the next novel point.
- The phishing site itself was very advanced and contained several unusual features. Chief among these was that the phish was interactive. . . upon providing your username you would be placed in a live chat with a purported member of Meta’s “Security Team”. In reality, the phishing site was initiating a connection to a Telegram channel controlled by the adversary, who was able to communicate with the victim in real time. Part way through the interaction, the “live chat” would freeze and the victim would be required to provide their password to “reauthenticate”, whereupon the victim would be prompted by the security team members for any MFA codes or access authorizations that may be required to gain control over the account. This is a particularly devious social engineering technique; by delaying request for the password until after the victim is already invested in a conversation with the fake support agent, it greatly increases the chance that the victim will provide this information so that they can complete the interaction they’ve already started.
What do you believe is the end goal of the campaign?
- It’s difficult to say exactly what the end goal of a particular campaign is. What is clear is that Meta for business accounts have specific value to adversaries. Fortra has observed several adversary behaviors that could be end goals of a campaign such as this.
- The simplest is resell. The adversary launching this campaign could simply intend to sell access to any captured accounts on the dark web. The buyer would then use the account for their own purposes, which might include one of the below endgames.
- An adversary might use the account to impersonate the organization. This could take several forms, from attempting to use DMs or other on-platform features to pivot into even more valuable accounts, or using the account to post disinformation for some purpose (perhaps motivated by geopolitical, financial, or hacktivism factors). Additionally, if your Meta Business account is based off of a Facebook account, an adversary could impersonate you on any program using the “Login with Facebook” authentication method.
- An adversary could lock the original owner out of the account, and then attempt to ransom access to the account back to the original owner. This tactic can be particularly effective when employed against organizations who use social media as their primary marketing channel.
- An adversary may also attempt to use the account to post ads for counterfeit goods. As social media companies have continued to refine their targeting algorithms, more and more goods purchases are initiated over a social media ad. Counterfeiters have taken notice; Fortra has observed a large increase in the advertisement of counterfeit goods via social media platforms over the past several years. By using an already verified business account, adversaries can bypass some of the social media platform’s fraud controls and have a generally higher success rate. If the account has payment methods established, the adversary can use the victim’s funds to launch their ads as well.
What can businesses do to mitigate this attack?
- Best practices around Email Security and end-user Security Awareness Training are paramount. By using a multi-layered email security solution that can block malicious emails from being delivered to end users and educating end users on how to identify and report suspicious emails that evade security you greatly decrease the risk of having your credentials compromised
- Additionally, businesses should take care to secure their Meta for business account using the most advanced identity features available to them (MFA, Security Keys, and unrecognized device alerts as of this writing). They should also limit access to account credentials to those individuals who absolutely require them. An even more secure implementation is to consider having different individuals control different authentication factors. For example, have the main user of the account own the password, but a separate individual own the device which receives MFA codes. This may not be feasible in some organizations, but forcing multiple individuals to be involved in a login attempt gives more opportunity for someone to recognize a scam.
Facebook Spied On Snapchat, Amazon, And YouTube Users…. WTF?
Posted in Commentary with tags Facebook on March 27, 2024 by itnerdPeople often ask my why I refuse to have a Facebook account. Or why I killed my Instagram account a few years ago. As well as why I haven’t got onto Threads. The answer is pretty simple. Meta, the company that owns all of those platforms are pretty evil and simply can’t be trusted. Here’s today’s example of why they can’t be trusted:
In 2016, Facebook launched a secret project designed to intercept and decrypt the network traffic between people using Snapchat’s app and its servers. The goal was to understand users’ behavior and help Facebook compete with Snapchat, according to newly unsealed court documents. Facebook called this “Project Ghostbusters,” in a clear reference to Snapchat’s ghost-like logo.
On Tuesday, a federal court in California released new documents discovered as part of the class action lawsuit between consumers and Meta, Facebook’s parent company.
The newly released documents reveal how Meta tried to gain a competitive advantage over its competitors, including Snapchat and later Amazon and YouTube, by analyzing the network traffic of how its users were interacting with Meta’s competitors. Given these apps’ use of encryption, Facebook needed to develop special technology to get around it.
One of the documents details Facebook’s Project Ghostbusters. The project was part of the company’s In-App Action Panel (IAPP) program, which used a technique for “intercepting and decrypting” encrypted app traffic from users of Snapchat, and later from users of YouTube and Amazon, the consumers’ lawyers wrote in the document.
The document includes internal Facebook emails discussing the project.
“Whenever someone asks a question about Snapchat, the answer is usually that because their traffic is encrypted we have no analytics about them,” Meta chief executive Mark Zuckerberg wrote in an email dated June 9, 2016, which was published as part of the lawsuit. “Given how quickly they’re growing, it seems important to figure out a new way to get reliable analytics about them. Perhaps we need to do panels or write custom software. You should figure out how to do this.”
Facebook’s engineers solution was to use Onavo, a VPN-like service that Facebook acquired in 2013. In 2019, Facebook shut down Onavo after a TechCrunch investigation revealed that Facebook had been secretly paying teenagers to use Onavo so the company could access all of their web activity.
If some of that sounds familiar, it should as I’ve written about Onavo before. But here’s the bottom line. Even for Meta, that’s a new low. And it illustrates how untrustworthy Mark Zuckerberg and Meta are. They clearly will stop at nothing to grab as much information about you as they can so that they can find new ways to make money. I for one refuse to be the product. Thus you will not see me use a Meta product for that reason. Meta is a company that needs some government intervention in the US because it’s clear from this example and others that they will not alter their behaviour unless they are forced to.
Leave a comment »