ThreatCluster
  • Feed
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Cluster #1374

Phishing Attack Spoofs Facebook Login Page to Capture Credentials

Threat Score:
60
2 articles
88.0% similarity
1 day ago
JSON CSV Text STIX IoCs
Splunk Elastic Sentinel Sigma YARA All Queries

Activity Timeline

2 articles
Click to navigate
Jul 25
Jul 25
Oldest
Latest

Key Insights

1
Cybercriminals are executing a sophisticated phishing campaign targeting Facebook users, utilizing a Browser-in-the-Browser (BitB) technique to capture credentials.
2
The attack initiates with a malicious redirect leading to a counterfeit login page, which includes a deceptive CAPTCHA prompt to trick users into entering their credentials.
3
This method effectively simulates an authentic login interface, making it difficult for victims to distinguish between real and fake pages.
4
The phishing campaign has been reported to affect both desktop and mobile browsers, increasing its potential victim pool significantly.
5
Immediate actions include user education on recognizing phishing attempts and implementing multi-factor authentication (MFA) to mitigate risks.

Threat Overview

A new phishing campaign targeting Facebook users employs a Browser-in-the-Browser (BitB) technique to steal credentials via a fake login page that includes a deceptive CAPTCHA prompt [1][2]. This attack affects users across both desktop and mobile platforms, leveraging a convincing overlay that mimics the legitimate Facebook interface [1][2]. Organizations should prioritize user training on phishing recognition and enforce multi-factor authentication (MFA) to enhance security [1]. Regular monitoring for unusual login attempts and user behavior is also recommended to detect potential breaches early [2].

Tactics, Techniques & Procedures (TTPs)

T1566.001
Spearphishing Link - Phishing links redirecting users to a fake login page [1][2]
T1071.001
Application Layer Protocol: Web Protocols - Use of web protocols to facilitate the phishing attack [1][2]
T1203
Exploitation for Client Execution - Users exploited through deceptive web interfaces [1][2]
T1564.001
Hidden Files and Directories - Use of deceptive CAPTCHA to hide malicious intent [1][2]

Timeline of Events

2025-07-24
Initial detection of the phishing campaign with multiple redirection chains reported [2]
2025-07-25
Public awareness raised regarding the phishing attack targeting Facebook users [1][2]
Powered by ThreatCluster AI
Generated 1 day ago
AI analysis may contain inaccuracies

Related Articles

2 articles
1

Phishing Attack Spoofs Facebook Login Page to Capture Credentials

GB Hackers • 1 day ago

Phishing Attack Spoofs Login Page to Capture Credentials Cybercriminals are using a variety of dishonest tactics in a sophisticated phishing effort aimed at users in order to obtain login information. The attack begins with a malicious redirect that leads victims to a fraudulent website mimicking legitimate interfaces. Here, users encounter a fake CAPTCHA prompt designed to appear as a standard security verification step. Upon interacting with this prompt, the site deploys a Browser-in-the-Brows

Score
51
97.0% similarity
Read more
2

New Phishing Attack Mimics Facebook Login Page to Steal Credentials

Cybersecurity News • 1 day ago

A rapidly evolving campaign is using a Browser-in-the-Browser (BitB) overlay to impersonate ’s login and siphon user credentials. The lure hinges on a deceptive CAPTCHA challenge that seamlessly morphs into a counterfeit session window, duping victims across desktops and mobile browsers alike. The malware surfaced on 24 July 2025 when multiple redirection chains began […]

Score
45
97.0% similarity
Read more

Save to Folder

Choose a folder to save this cluster:

Cluster Intelligence

Key entities and indicators for this cluster

ATTACK TYPES
Phishing
Social Engineering
COMPANIES
Facebook
Google
Apple
VMware
Amazon
MITRE ATT&CK
Phishing
PLATFORMS
Windows
AWS
Azure
Android
iOS
VULNERABILITIES
DoS
DDoS
SECURITY VENDORS
Cloudflare
INDUSTRIES
Education
Media
RANSOMWARE
Zlader
DN
Korean
AnDROid
APT GROUPS
Careto
MALWARE
Dark
Hook
Careto
CLUSTER INFORMATION
Cluster #1374
Created 1 day ago
Semantic Algorithm