Facebook phishing under the pretext of winning a FreeFire prize

These three screenshots show a multi‑step phishing campaign targeting Free Fire players. The scam promises free in‑game rewards (diamonds, magic cubes, etc.) and then directs victims to a fake Facebook login page to steal their credentials. Threat Analysis: Free Fire Reward Phishing – Facebook Credential Harvesting How the scam works (3 steps): Step 1 – …

Phishing of Facebook under the pretext of boosting likes

These two screenshots show a Facebook engagement scam (“like boosting”) combined with a fake Facebook login page. The scam promises to increase likes, views, or engagement on social media posts, but instead steals the victim’s Facebook credentials. Threat Analysis: Facebook “Like Booster” Scam – Credential Harvesting How it works:The victim encounters a link (via social …

Preparation of an attack on Facebook in Spanish detected

This screenshot shows a Spanish‑language phishing page impersonating Facebook. The page is designed to steal login credentials (mobile number or email address and password). Threat Analysis: Facebook Phishing – Credential Harvesting (Spanish Variant) How it works:The victim receives a phishing email, SMS, or social media message claiming a security alert, account issue, or the need …

The preparation of a phishing attack on Facebook in French was revealed

This screenshot shows a French‑language phishing page impersonating Facebook. The page asks for the victim’s email address and password to “identify” themselves, then steals the credentials. Threat Analysis: Facebook Phishing – Credential Harvesting (French Variant) How it works:The victim receives a phishing email, SMS, or social media message claiming a security alert, account issue, or …

Arabic phishing Facebook pages identified.

This screenshot shows an Arabic‑language phishing page impersonating Facebook. The page asks for the victim’s email address and password under the pretext of “logging in” before accessing content or claiming a reward. Threat Analysis: Facebook Phishing – Credential Harvesting (Arabic Variant) How it works:The victim receives a phishing email, SMS, or social media message claiming …

Facebook spoof pages detected

A high-risk Facebook spoofing campaign that uses urgent “security alert” pretexts to harvest user credentials and two-factor authentication codes. These attacks utilize phishing pages and redirect chains to bypass security, often impersonating Meta support to hijack user and business accounts. This screenshot shows a generic Facebook phishing page designed to steal login credentials (email/phone number …

Thai phishing Facebook pages detected.

This screenshot shows a Thai‑language phishing page impersonating Facebook. The page asks for the victim’s mobile phone number or email address and password to log in, then steals the credentials. Threat Analysis: Facebook Phishing – Credential Harvesting (Thai Variant) How it works:The victim receives a phishing email, SMS, or social media message claiming a security …

Preparations for a phishing attack on Banco Hipotecario Argentina have been detected

This screenshot shows a phishing page impersonating Banco Hipotecario, an Argentine bank. The page presents a fake security alert or service notification, urging the victim to click a “VERIFICAR” (Verify) button, which leads to a fraudulent website designed to steal online banking credentials. Threat Analysis: Banco Hipotecario Phishing – Fake Verification Alert How it works:The …

Facebook and Google phishing pages have been detected disguised as Freefire rewards

These screenshots show a phishing campaign that uses “FreeFire Rewards” as a lure to steal login credentials for either Facebook or Google. Victims are promised in-game rewards and then directed to fake login pages. Threat Analysis: FreeFire Reward Phishing – Facebook & Google Credential Harvesting How the scam works (common flow for both variants): The …

Preparation of phishing attack on Argentine digital Brubank revealed

Updated 2021-09-17. New phishing attack detected: Below are the descriptions for the two phishing screenshots. 1. Brubank Phishing – Fake “Open in App” Redirect Threat Analysis:This page impersonates Brubank, a digital bank in Argentina. The victim is shown a prompt claiming they need to open the link in the Brubank mobile app to continue an …