{"id":33707,"date":"2024-06-11T21:42:12","date_gmt":"2024-06-11T10:42:12","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/facebook-scam-24-hours-are-left-ro-request-review-see-why\/33707\/"},"modified":"2024-06-11T21:42:16","modified_gmt":"2024-06-11T10:42:16","slug":"facebook-scam-24-hours-are-left-ro-request-review-see-why","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/facebook-scam-24-hours-are-left-ro-request-review-see-why\/33707\/","title":{"rendered":"Phishing using FB infrastructure stealing business-account passwords"},"content":{"rendered":"<p>Cybercriminals in the password theft business are constantly coming up with new ways to deliver phishing emails. Now they\u2019ve learned to use a legitimate Facebook mechanism to send fake notifications threatening to block Facebook business accounts. We explore how the scheme works, what to pay attention to, and what measures to take to protect business accounts on social networks.<\/p>\n<h2>Anatomy of the phishing attack on Facebook business accounts<\/h2>\n<p>\nIt all starts with a message sent by the social network itself to the email address linked to the victim\u2019s Facebook business account. Inside is a menacing icon with an exclamation mark, and an even more menacing text: \u201c24 Hours Left To Request Review. See Why.\u201d<\/p>\n<div id=\"attachment_51448\" style=\"width: 1290px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2024\/06\/11214028\/facebook-scam-24-hours-are-left-ro-request-review-see-why-1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-51448\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2024\/06\/11214028\/facebook-scam-24-hours-are-left-ro-request-review-see-why-1.jpg\" alt=\"Email warning that a Facebook business account could be blocked\" width=\"1280\" height=\"628\" class=\"size-full wp-image-51448\"><\/a><p id=\"caption-attachment-51448\" class=\"wp-caption-text\">Email with a fake warning about account problems, sent by Facebook itself<\/p><\/div>\n<p>Added to this are other words which, combined with the above text, look odd. But a manager responsible for Facebook may, in haste or in panic, fail to spot these irregularities and follow the link by clicking the button in the email or manually open Facebook in a browser and check for the notifications.<\/p>\n<p>Either way, they\u2019ll end up on Facebook. After all, the email is real, so the buttons really do point to the social network\u2019s site. A notification is waiting there \u2014 with the now familiar orange icon and same threatening words: \u201c24 Hours Left To Request Review. See Why.\u201d<\/p>\n<div id=\"attachment_51449\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2024\/06\/11214036\/facebook-scam-24-hours-are-left-ro-request-review-see-why-2.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-51449\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2024\/06\/11214036\/facebook-scam-24-hours-are-left-ro-request-review-see-why-2.jpg\" alt=\"Phishing notification in Facebook\" width=\"690\" height=\"389\" class=\"size-full wp-image-51449\"><\/a><p id=\"caption-attachment-51449\" class=\"wp-caption-text\">Phishing notification informing the victim their account will be blocked for non-compliance with the terms of service<\/p><\/div>\n<p>The notification contains more details, alleging that the account and page are to be blocked because someone complained about their non-compliance with the terms of service. The victim is then prompted to follow a link to dispute the decision to block their account.<\/p>\n<p>If they do, a website opens (this time, bearing the Meta logo, not Facebook) with roughly the same message as in the notification, but the time granted to resolve the issue has been halved to 12 hours. We suspect that scammers use the Meta logo this time because they try similar schemes on other Meta platforms \u2014 we found at least one \u201clocation\u201d on Instagram with the same name: \u201c24 Hours Left To Request Review. See Why.\u201d<\/p>\n<div id=\"attachment_51450\" style=\"width: 1430px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2024\/06\/11214052\/facebook-scam-24-hours-are-left-ro-request-review-see-why-3.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-51450\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2024\/06\/11214052\/facebook-scam-24-hours-are-left-ro-request-review-see-why-3.jpg\" alt=\"Phishing page for appealing the account block\" width=\"1420\" height=\"918\" class=\"size-full wp-image-51450\"><\/a><p id=\"caption-attachment-51450\" class=\"wp-caption-text\">On a phishing page outside Facebook, the victim is prompted to appeal the block<\/p><\/div>\n<p>After clicking the Start button, through a series of redirects the visitor lands on a page with a form asking initially for relatively innocent data: page name, first and last names, phone number, date of birth.<\/p>\n<div id=\"attachment_51451\" style=\"width: 1287px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2024\/06\/11214104\/facebook-scam-24-hours-are-left-ro-request-review-see-why-4.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-51451\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2024\/06\/11214104\/facebook-scam-24-hours-are-left-ro-request-review-see-why-4.jpg\" alt=\"Phishing form asking for personal data\" width=\"1277\" height=\"918\" class=\"size-full wp-image-51451\"><\/a><p id=\"caption-attachment-51451\" class=\"wp-caption-text\">] The second screen asks the victim to enter certain personal data<\/p><\/div>\n<p>It\u2019s the next screen where things get juicy: here you need to enter the email address or phone number linked to your Facebook account and your password. As you might guess, it\u2019s this data that the attackers are after.<\/p>\n<div id=\"attachment_51452\" style=\"width: 1313px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2024\/06\/11214123\/facebook-scam-24-hours-are-left-ro-request-review-see-why-5.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-51452\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2024\/06\/11214123\/facebook-scam-24-hours-are-left-ro-request-review-see-why-5.jpg\" alt=\"Phishing form for entering Facebook credentials\" width=\"1303\" height=\"912\" class=\"size-full wp-image-51452\"><\/a><p id=\"caption-attachment-51452\" class=\"wp-caption-text\">The attackers don\u2019t waste any time in requesting your Facebook account credentials<\/p><\/div>\n<h2>How the phishing scheme exploits real Facebook infrastructure<\/h2>\n<p>\nNow let\u2019s see how threat actors get Facebook to send phishing notifications on their behalf. They do so by using hijacked Facebook accounts. The account name is changed straight away to the most troubling title: \u201c24 Hours Left To Request Review. See Why.\u201d They also change the profile pic so that the preview shows an orange icon with the exclamation mark already familiar to us from the email and notification.<\/p>\n<div id=\"attachment_51453\" style=\"width: 478px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2024\/06\/11214133\/facebook-scam-24-hours-are-left-ro-request-review-see-why-6.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-51453\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2024\/06\/11214133\/facebook-scam-24-hours-are-left-ro-request-review-see-why-6.jpg\" alt=\"Hijacked Facebook account used to send phishing notifications\" width=\"468\" height=\"1119\" class=\"size-full wp-image-51453\"><\/a><p id=\"caption-attachment-51453\" class=\"wp-caption-text\">Attackers change the name and profile picture of the hijacked Facebook account<\/p><\/div>\n<p>That done, the message about the account block is posted from the account. At the bottom of this message, a mention of the victim\u2019s page appears after a few dozen empty lines. By default it\u2019s hidden, but on clicking the \u201cSee more\u201d link in the phishing post, the mention becomes visible.<\/p>\n<div id=\"attachment_51454\" style=\"width: 1890px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2024\/06\/11214151\/facebook-scam-24-hours-are-left-ro-request-review-see-why-7.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-51454\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2024\/06\/11214151\/facebook-scam-24-hours-are-left-ro-request-review-see-why-7.jpg\" alt=\"Cybercriminal posts that mention company accounts \" width=\"1880\" height=\"1128\" class=\"size-full wp-image-51454\"><\/a><p id=\"caption-attachment-51454\" class=\"wp-caption-text\">The trick is the hard-to-spot mention of the targeted Facebook business account at the bottom of the post<\/p><\/div>\n<p>Threat actors post such messages from the hijacked account in bulk all at once, each of which mentions one of the target Facebook business accounts.<\/p>\n<div id=\"attachment_51455\" style=\"width: 1290px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2024\/06\/11214204\/facebook-scam-24-hours-are-left-ro-request-review-see-why-8.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-51455\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2024\/06\/11214204\/facebook-scam-24-hours-are-left-ro-request-review-see-why-8.jpg\" alt=\"Bulk publication of posts mentioning a hijacked Facebook account\" width=\"1280\" height=\"1024\" class=\"size-full wp-image-51455\"><\/a><p id=\"caption-attachment-51455\" class=\"wp-caption-text\">Hijacked accounts generate a slew of posts, each of which mentions the account of a targeted organization<\/p><\/div>\n<p>As a result, Facebook diligently sends notifications to all accounts mentioned in these posts, both within the social network itself and to the email addresses linked to these accounts. And because delivery is via the actual Facebook infrastructure, these notifications are guaranteed to reach their intended recipients.<\/p>\n<h2>How to protect business social media accounts from hijacking<\/h2>\n<p>\nWe should note that phishing isn\u2019t the only threat to business accounts. There exists an entire class of malware specially created <a href=\"https:\/\/www.kaspersky.com\/blog\/how-criminals-can-get-your-password\/46716\/\" target=\"_blank\" rel=\"noopener nofollow\">for password theft<\/a>; such programs are known as password stealers. For this same purpose, attackers can also use browser extensions \u2014 see our recent post about <a href=\"https:\/\/www.kaspersky.com\/blog\/ducktail-steals-facebook-business-accounts\/49845\/\" target=\"_blank\" rel=\"noopener nofollow\">their use in hijacking Facebook business accounts<\/a>.<\/p>\n<p>Here\u2019s what we recommend for protecting the social media accounts of your business:\n<\/p>\n<ul>\n<li>Always use <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-two-factor-authentication\/48289\/\" target=\"_blank\" rel=\"noopener nofollow\">two-factor authentication<\/a> wherever possible.<\/li>\n<li>Pay close attention to notifications about suspicious login attempts.<\/li>\n<li>Make sure all your passwords are both strong and unique. To generate and store them, it\u2019s best to use a <a href=\"https:\/\/www.kaspersky.com.au\/password-manager?icid=au_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">password manager<\/a>.<\/li>\n<li>Carefully check the addresses of pages asking for account credentials: if there\u2019s even the slightest suspicion that a site is fake, do not enter your password.<\/li>\n<li>Equip all work devices with <a href=\"https:\/\/www.kaspersky.com.au\/small-to-medium-business-security?icid=au_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">reliable protection<\/a> that will warn of danger ahead of time and block the actions of both malware and browser extensions.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are using genuine Facebook infrastructure to send phishing emails threatening to block accounts.<\/p>\n","protected":false},"author":2704,"featured_media":33709,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2993,2994],"tags":[3086,2639,2141,19,20,187,76,98,422],"class_list":{"0":"post-33707","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-account-hijacking","11":"tag-accounts","12":"tag-business","13":"tag-email","14":"tag-facebook","15":"tag-passwords","16":"tag-phishing","17":"tag-social-networks","18":"tag-threats"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/facebook-scam-24-hours-are-left-ro-request-review-see-why\/33707\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/facebook-scam-24-hours-are-left-ro-request-review-see-why\/27563\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/facebook-scam-24-hours-are-left-ro-request-review-see-why\/22881\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/facebook-scam-24-hours-are-left-ro-request-review-see-why\/30234\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/facebook-scam-24-hours-are-left-ro-request-review-see-why\/27713\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/facebook-scam-24-hours-are-left-ro-request-review-see-why\/37684\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/facebook-scam-24-hours-are-left-ro-request-review-see-why\/51447\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/facebook-scam-24-hours-are-left-ro-request-review-see-why\/27888\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/facebook-scam-24-hours-are-left-ro-request-review-see-why\/33371\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/33707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2704"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=33707"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/33707\/revisions"}],"predecessor-version":[{"id":33708,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/33707\/revisions\/33708"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/33709"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=33707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=33707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=33707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}