AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion
好的,我现在需要帮用户总结一篇文章,控制在100字以内。用户的要求很明确,直接写文章描述,不需要特定的开头。首先,我得仔细阅读文章内容,抓住主要信息。 文章主要讲的是网络威胁分子利用中间人钓鱼页面攻击TikTok商业账户。他们使用了仿冒页面,比如Google职业页面,诱导用户点击恶意链接。接着,他们通过Cloudflare检查来绕过机器人检测,最终窃取用户的凭证。此外,还有另一个钓鱼活动使用SVG文件传播恶意软件。 我需要把这些关键点浓缩到100字以内。先确定主要攻击目标是TikTok商业账户和Google职业页面。然后提到钓鱼页面和恶意链接的使用,以及Cloudflare检查的手段。最后提到另一个活动用SVG文件传播恶意软件。 确保语言简洁明了,不遗漏重要信息。可能需要调整句子结构,使其更紧凑。例如,“网络威胁分子利用中间人钓鱼页面攻击TikTok商业账户”已经涵盖了主要攻击方式和目标。 最后检查字数是否符合要求,并确保信息准确无误。 </think> 网络威胁分子利用中间人钓鱼页面攻击TikTok商业账户及Google职业页面,诱导用户点击恶意链接并窃取凭证。同时,另一钓鱼活动通过伪装成发票的SVG文件传播恶意软件。 2026-3-27 12:3:0 Author: thehackernews.com(查看原文) 阅读量:4 收藏

Threat actors are using adversary-in-the-middle (AitM) phishing pages to seize control of TikTok for Business accounts in a new campaign, according to a report from Push Security.

Business accounts associated with social media platforms are a lucrative target, as they can be weaponized by bad actors for malvertising and distributing malware.

"TikTok has been historically abused to distribute malicious links and social engineering instructions," Push Security said. "This includes multiple infostealers like Vidar, StealC, and Aura Stealer delivered via ClickFix-style instructions with AI-generated videos posed as activation guides for Windows, Spotify, and CapCut."

The campaign begins with tricking victims into clicking on a malicious link that directs them to either a lookalike page impersonating TikTok for Business or a page that's designed to impersonate Google Careers, along with an option to schedule a call to discuss the opportunity.

It's worth noting that a prior iteration of this credential phishing campaign was flagged by Sublime Security in October 2025, with emails masquerading as outreach messages used as a social engineering tactic.

Regardless of the type of page served, the end goal is the same: perform a Cloudflare Turnstile check to block bots and automated scanners from analyzing the contents of the page and serve a malicious AitM phishing page login page that's designed to steal their credentials.

The phishing pages are hosted on the following domains -

  • welcome.careerscrews[.]com
  • welcome.careerstaffer[.]com
  • welcome.careersworkflow[.]com
  • welcome.careerstransform[.]com
  • welcome.careersupskill[.]com
  • welcome.careerssuccess[.]com
  • welcome.careersstaffgrid[.]com
  • welcome.careersprogress[.]com
  • welcome.careersgrower[.]com
  • welcome.careersengage[.]com
  • welcome.careerscrews[.]com

The development comes as another phishing campaign has been observed using Scalable Vector Graphics (SVG) file attachments to deliver malware to targets located in Venezuela.

According to a report published by WatchGuard, the messages have SVG files with file names in Spanish, masquerading as invoices, receipts, or budgets. 

"When these malicious SVGs are opened, they communicate with a URL that downloads the malicious artifact," the company said. "This campaign uses ja.cat to shorten URLs from legitimate domains that have a vulnerability that allows redirects to any URL, so they point to the original domain where the malware is downloaded."

The downloaded artifact is a malware written in Go that shares overlaps with a BianLian ransomware sample detailed by SecurityScorecard in January 2024.

"This campaign is a strong reminder that even seemingly harmless file types like SVGs can be used to deliver serious threats," WatchGuard said. "In this case, malicious SVG attachments were used to initiate a phishing chain that led to malware delivery associated with BianLian activity."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/aitm-phishing-targets-tiktok-business.html
如有侵权请联系:admin#unsafe.sh