Global Phishing Targeting Meta Business Accounts

Our threat intelligence team investigated a phishing campaign impersonating Meta Business and Ads Manager support, using fake “policy violation” and “trademark rights” alerts to steal credentials, hijack ad accounts, and launch fraudulent campaigns

Written by
Veronika Katsevych
on
November 21, 2025

The campaign primarily targets small and mid-sized businesses, advertising agencies, and social-media managers who use Meta Ads for their marketing.
For these victims, losing access isn’t just an inconvenience — it means losing customers, visibility, and revenue.

Once an account is compromised, the attacker:

  • Changes billing information, adding stolen or virtual cards.
  • Launches scam ads promoting fake crypto or investment platforms.
  • Removes legitimate administrators, taking full control.

Even a single breach can cause significant financial and reputational harm.
The operation’s global reach suggests a sophisticated and disciplined criminal enterprise.

Warning Signs

  • Urgent messages about “24-hour suspension” or “policy removal.”
  • Meta-style designs with small grammar errors (“We have suspend your page”).
  • Links to fake “Help Center” pages asking for login or 2FA.
  • Rapid ad or billing changes right after a new login.

Recommended Actions

Use hardware-based MFA for all admins.

Require approval for billing or admin changes.

Detect fast sequences (login → payment → ad creation).

Verify all Meta messages directly inside Business Manager.

Read the full report

Phishing Operations Targeting Meta Business Accounts

About the Author

Veronika Katsevych

Veronika is a multi-lingual threat hunter working to identify and analyze foreign source material. She is passionate about threat detection, penetration testing, and building stronger defenses through offensive security.

Read More...