Facebook and Freefire fake pages detected

Free Fire “Skin Generator” Scam – Facebook Credential Harvesting This phishing campaign targets players of Free Fire, a popular mobile battle royale game developed by Garena. The scam promises free in-game skins and diamonds through a fake “generator” tool. In reality, it is a multi-step scheme designed to steal victims’ Facebook login credentials (the primary …

Freefire fake page ad Facebook phishing revealed

Free Fire “Rewards Generator” Scam – Facebook Credential Harvesting (Variant) This phishing campaign targets Free Fire players by promising free in-game rewards (skins, diamonds, rare items) through a fake “generator” tool. The scam uses a multi-step process designed to steal victims’ Facebook login credentials, which are commonly used to access Free Fire accounts. How it …

Facebook phishing page detected

Free Fire “Anniversary Event” Scam – Facebook Credential Harvesting (Indonesian Variant) This phishing campaign targets Free Fire players in Indonesia and other Indonesian-speaking regions by promoting a fake “anniversary event” offering free rewards. The scam uses localized language and cultural references to appear legitimate. How it works:The victim encounters a link to this scam via …

Social media phishing with fake Freefire gift card detected

These screenshots show a phishing campaign that uses fake Free Fire gift cards as a lure to steal login credentials for various platforms (game accounts, social media, or Google). The victim is promised a free gift card (210, 530, 1080, or 2200 units) and then asked to log in, handing over their phone number/email and …

FreeFire NewEven phishing page with fake Facebook Login-window detected

This screenshot shows a phishing page that uses a fake “Free Fire New Event” as a lure to trick victims into logging in with Facebook. The page mimics the Facebook login interface to steal the victim’s credentials. Threat Analysis: Free Fire Event Phishing – Facebook Credential Harvesting How it works:The victim receives a link (via …