Widespread ‘I Can’t Believe He Is Gone’ Facebook Phishing Scam Targets Users Through Hacked Accounts

by | Jan 22, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

A pervasive Facebook phishing campaign, employing a heart-wrenching message – “I can’t believe he is gone. I’m gonna miss him so much,” is luring unsuspecting users into a web of deceit by redirecting them to a site designed to steal Facebook credentials.

This ongoing phishing attack, widely disseminated on Facebook through compromised accounts of friends, serves as a breeding ground for a substantial inventory of stolen accounts, strategically amassed for potential exploitation in further scams on the social media platform.

Given that the phishing posts originate from hacked accounts of friends, they carry an air of authenticity, making them more convincing and thereby tricking numerous users into falling prey to the scam.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

The campaign, which commenced approximately a year ago, poses a persistent challenge for Facebook to thwart as it continues to circulate. Although Facebook deactivates the redirect links in reported posts, new ones keep emerging.

The ‘I can’t believe he is gone’ scam manifests in two variants. The first straightforwardly presents the message and includes a Facebook redirect link. The second, while sharing the same text, displays what seems to be a BBC News video depicting a car accident or crime scene.

Facebook "I'm gonna miss him so much" phishing postsFacebook “I’m gonna miss him so much” phishing posts
Source: BleepingComputer

Upon testing the links, users clicking from the Facebook app on mobile devices are directed to a deceptive news site named ‘NewsAmericaVideos.’ Here, visitors are prompted to enter their Facebook credentials under the guise of confirming their identity to watch the video. The background displays a blurred-out video, an illusion created with an image downloaded from Discord.

 

Facebook phishing pageFacebook phishing page
Source: BleepingComputer

Entering credentials on this fraudulent site empowers threat actors to pilfer them, subsequently redirecting users to Google. While the ultimate purpose of the stolen credentials remains unknown, it is suspected that threat actors leverage them to perpetuate the same phishing posts through compromised accounts.




On desktop computers, the phishing pages behave differently, redirecting users to Google or other scams endorsing VPN apps, browser extensions, or affiliate sites.

This widespread phishing scam generates numerous posts daily, originating from compromised accounts of friends and family who unknowingly fell victim to the same scam.

In light of this phishing attack’s omission of attempts to steal two-factor authentication (2FA) tokens, Facebook users are strongly advised to enable 2FA for an added layer of protection. This security feature prompts users to enter a unique one-time passcode each time their credentials are utilized to log in from an unfamiliar location, mitigating the risk even if credentials are compromised.

For optimal security, users are encouraged to use an authentication app, rather than SMS texts, when enabling two-factor authentication on Facebook, as phone numbers are susceptible to theft in SIM swapping attacks.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This