New Phishing Scam Imitates Facebook Login Page to Harvest User Credentials

A sophisticated new phishing campaign is targeting Facebook users by leveraging advanced social engineering tactics, including a convincing fake CAPTCHA and the “Browser-in-the-Browser” (BitB) technique, to steal login credentials.

Security researchers have identified a surge in malicious domains explicitly designed to mimic legitimate Facebook authentication workflows, putting unsuspecting users at heightened risk.

Attackers Employ Fake CAPTCHA

The attack begins with a malicious redirect that leads users to a seemingly innocuous webpage presenting a fake CAPTCHA prompt, purportedly as a security verification measure.

Unlike typical phishing attempts, this page is meticulously crafted to emulate common web security interfaces, reducing users’ suspicion and increasing conversion rates.

Upon interacting with the fake CAPTCHA, victims are presented with a convincing Facebook login popup a Browser-in-the-Browser window that replicates the look and feel of a genuine browser authentication dialog.

Phishing Scam
Facebook login popup

This Browser-in-the-Browser method is particularly dangerous due to its ability to spoof browser UI elements such as address bars, padlocks, and window frames, deceiving even tech-savvy users into believing they are interacting with Facebook’s official site.

When credentials are entered, they are harvested by the attackers in real time, granting them access to the victim’s personal account and potentially exposing associated data and sensitive communications.

What sets this campaign apart is the array of domains used to host these phishing pages, which incorporate keywords related to meta, CAPTCHA, and Facebook, further enhancing their legitimacy to unsuspecting users.

Examples include recaptcha-metahorizon[.]com, facebook[.]com (a simple letter transposition), and verify-facebook[.]com.

Such naming conventions are designed to bypass rudimentary security awareness and evade automated phishing filters.

Multiple Malicious Domains Identified

Researchers emphasize that users must remain vigilant against unsolicited login requests, especially when preceded by CAPTCHA or anti-bot verifications. S

Security teams are urged to disseminate warnings regarding this campaign and update their security appliances to block the identified domains.

The growing sophistication of Browser-in-the-Browser phishing attacks highlights the importance of browser-level anti-phishing solutions and endpoint detection tools that can distinguish legitimate browser dialogs from fraudulent popups.

Security professionals recommend that organizations implement multi-factor authentication, educate users about emerging phishing trends, and remind them to verify URLs in browser address bars before entering credentials.

If you have interacted with any of these domains or entered login information, it is imperative to change your Facebook password immediately and enable account security features. Vigilance and rising awareness remain the keys to thwarting such advanced phishing threats.

Indicators of Compromise (IoC)

Malicious DomainDescription
recaptcha-metahorizon[.]comFake CAPTCHA, Meta-themed
norotbot-meta[.]comAnti-bot spoof, Meta-related
loginpage-meta[.]comImitates Meta login page
meta-captcha[.]comMeta-branded CAPTCHA phishing
facefbook[.]comTypo-squatted Facebook domain
ncaptcha-meta[.]comCAPTCHA for Meta theme
notrobot-metahorizon[.]comFake anti-bot, Meta-branded
clearcapcha[.]comMisspelled CAPTCHA, generic
antibot-meta[.]comGeneric anti-bot, Meta-related
captcha-loginmeta[.]comCombines CAPTCHA and Meta wording
verify-facebook[.]comSpoofs Facebook verification
autobypass-meta[.]comAnti-bot evasion theme, Meta
recaptcha-loginmeta[.]comRecaptcha and Meta login phishing

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here