
Image by Brett Jordan, from Unsplash
New Government-Led Hacking Campaign Targets Meta Business Users
Cybercriminals are hijacking Meta accounts using stolen session cookies, bypassing two-factor authentication, and launching scam ads via Meta’s business features.
In a rush? Here are the quick facts:
- Threat actors steal cookies to bypass 2FA and access business accounts.
- Hijacked accounts are used for spreading malicious ads and scams.
- Cybercriminals exploit Meta Business features to lock owners out.
According to a new report by Proofpoint, government hackers from North Korea, Iran and Russia have been caught using a sneaky trick called ClickFix—a method originally used by online criminals to fool people into infecting their own computers.
Proofpoint researchers discovered that over just three months these state-backed actors tried the ClickFix method in various espionage campaigns.
ClickFix uses fake pop-up boxes that look like system alerts. The target is told there’s a problem and is given steps to fix it—like copying and pasting a code into their computer’s terminal. But doing so secretly downloads malware.
TA427, a North Korean group also known as Kimsuky, used this technique in emails pretending to come from diplomats. Victims were led to fake websites that showed error messages and tricked them into running harmful code.
ClickFit isn’t revolutionary—it just replaces older hacking steps with a more deceptive approach. But its rapid spread among state hackers suggests more will try it soon.
“As with other criminal techniques, state-sponsored actors observe and emulate other groups,” Proofpoint noted.
Proofpoint warns that while the method isn’t yet common among state-sponsored hackers, its increasing use shows how quickly tactics can spread. Governments are learning from criminals—and that could mean more sophisticated cyberattacks in the future.
Leave a Comment
Cancel