Industry News

Phishing Attacks Use Social Media Notifications to Steal Credentials

Attackers are looking to steal the credentials of Instagram, Facebook, and Twitter users with elaborate phishing campaigns. The target of these campaign employees of major enterprise organizations.

It might seem odd that attackers would go after social media accounts, but they have good reasons for this strategy. One of the reasons is that many people tend to use the same passwords for their personal and work accounts, which means that bad actors will often get a password that works on multiple domains.

These campaigns look just like any other phishing attempt. The goal is to trick people into entering their credentials into websites that look very much like the original they’re impersonating. It’s a well-known method that relies on the employees’ lack of training to recognize phishing campaigns.

“These attacks impersonate popular social media platforms to deliver phishing emails to influential users of each platform by impersonating Instagram, Facebook, and Twitter, in an attempt to extract login credentials,” say the researchers from Abnormal Security.

“In each case, these social media platforms are impersonated and contain urgent language, pressing the user to take action or their accounts will be deleted. The action to be taken is embedded in a link provided to appeal the decision to delete the account by the platform.”

The landing websites look very much like their real counterparts, and the Twitter domain imitates the actual one by replacing the “i” with a lower case “l”.

With so many people working from home, the activity on social media increased accordingly. If the employees lack the proper training to recognize a phishing campaign, they might be tempted to go through the steps and give their credentials to a third-party. It’s important to know that social media websites or any other services will not issue such emails, threatening suspension or termination of services. Always be careful when receiving email seemingly coming from official sources, and never open attachments coming from unknown sources.

About the author

Silviu STAHIE

Silviu is a seasoned writer who followed the technology world for almost two decades, covering topics ranging from software to hardware and everything in between. He's passionate about security and the way it shapes the world, in all aspects of life. He's also a space geek, enjoying all the exciting new things the Universe has to offer.