With Facebook redirects
In recent weeks, security teams have observed a sophisticated phishing campaign: Facebook’s own forwarding mechanism is being misused to redirect users to deceptively real login replicas and steal login data.
The attackers disguise malicious targets behind seemingly legitimate Facebook URLs (e.g. l.facebook.com/l.php?u=…), exploiting both automated scanners and human trust in the Facebook domain.
Tactics
The phishing emails are formulated as urgent security warnings or account notifications. They are visually based on the Facebook style and use social engineering to persuade recipients to click.
The link initially shows a Facebook domain and thus creates a feeling of credibility. Ultimately, however, the URL redirects to an attacker infrastructure that is an almost perfect copy of the Facebook login page.
Once the credentials have been entered, they are sent to the attackers. In some cases, the fake page then generates an “incorrect password” message to persuade the victim to enter a second set of credentials — and thus obtain the valid credentials.
Why this technique is so effective
Forwarding services of large platforms legitimately serve as a protection mechanism, while at the same time generating trust among users.
Attackers reverse this advantage of trust: The legitimate domain serves as a cloak for the malicious target address, bypassing email gateways and user skepticism. The campaign is also rolled out in several languages, which significantly increases its reach.
Concrete protective measures for companies and IT teams
- Be suspicious of links — always check the final target URL (hover/link preview) and do not follow blindly.
- Enforce Multi-Factor Authentication (MFA) — even with compromised passwords, MFA significantly reduces the damage.
- Hardening email security — integrating URL reputation, link sandboxes and heuristic analyses.
- Phishing simulation and awareness programs — Repeated training significantly reduces click rates.
Conclusion
This campaign shows: Attackers are adapting and using legitimate platform functions to their advantage.
For companies, this means not only strengthening technical defenses, but also processes, Awareness and responsiveness on an ongoing basis.
If you take action now — roll out MFA, carry out phishing checks and train employees — you will significantly reduce the risk.
With the DEFENDERBOX we offer companies a proactive approach to cyber security:
- Continuous scanning of the entire infrastructure
- Detecting security vulnerabilities before attackers exploit them
- Clear recommendations for technical and organizational measures
- Integration of security checks into existing processes and audits
In this way, we help companies to turn IT security from a purely IT issue into a strategic success factor.
👉 Do you want to know how your IT security is doing? Find out now here Start cyber check.
Stay vigilant — your IT will stay that way with us.
Image source: X