A newly discovered phishing campaign targeting Facebook users has raised alarms among cybersecurity experts, as it has successfully reached over 12,279 email addresses across hundreds of companies.
Sophisticated Campaign Exploits Salesforce Mailing Service
Researchers at Check Point Software Technologies revealed that the campaign, which began around December 20, 2024, has primarily impacted enterprises in the European Union (45.5%), the United States (45%), and Australia (9.5%).
The phishing scheme also includes versions in Chinese and Arabic, indicating its global reach.
The attackers leverage Salesforce’s automated mailing service to distribute fraudulent emails without breaching Salesforce’s security systems or violating its terms of service.
By using the sender ID “[email protected],” the emails appear legitimate and trustworthy.
These phishing emails are branded with counterfeit Facebook logos and falsely notify recipients of alleged copyright infringement violations.
The message warns users that their activity may be in violation of copyright laws and urges them to take immediate action to avoid account suspension.
Recipients who fall for the scam are redirected to a fake Facebook support page designed to harvest credentials.
This page mimics official Facebook interfaces and prompts users to input sensitive information under the pretense of account “review” to prevent deactivation.
The embedded credential-harvesting technology on these pages enables attackers to steal login details, granting them unauthorized access to Facebook accounts.

Implications for Businesses and Organizations
The consequences of this phishing campaign are particularly severe for businesses that rely on Facebook for advertising, customer engagement, or as an online storefront.
Cybercriminals gaining access to administrator accounts can manipulate content, alter security settings, or even lock out legitimate administrators.
This could lead to reputational damage, loss of client trust, and potential legal liabilities.
For industries such as healthcare and finance, where regulatory compliance is critical, a breach could result in significant fines and legal challenges.
Moreover, compromised accounts could be used to distribute further phishing links or malicious content, amplifying the attack’s impact on customers and stakeholders.
Organizations can take several steps to protect themselves from such phishing threats.
Setting up alerts for suspicious logins and unusual activity can help detect unauthorized access early.
Educating employees about identifying phishing attempts is crucial; they should be instructed to verify account status directly through Facebook rather than clicking on embedded email links.
Businesses should also inform customers about how they communicate officially and under what circumstances they might send messages, reducing the likelihood of further victimization post-account hijacking.
Additionally, maintaining a robust incident response plan is essential for mitigating damage in case of a breach.
This includes steps for recovering compromised accounts and communicating transparently with affected customers.
As phishing campaigns grow more sophisticated, organizations must remain vigilant and adopt proactive cybersecurity measures to safeguard their digital assets and reputation.