top of page

AITM Phishing Campaign Targets TikTok Business Accounts with Cloudflare Evasion Tactics

  • Mar 27
  • 2 min read

Key Findings


  • Push Security identified a new AITM phishing campaign targeting TikTok for Business accounts to hijack them for malvertising and fraud

  • Attackers use fake TikTok and Google-themed pages with Cloudflare Turnstile bot protection to bypass security scanners

  • Newly registered domains are created rapidly and hosted behind Cloudflare, making them difficult to track

  • Compromised accounts are used for malvertising, credential theft, malware distribution, and ad fraud

  • Many users log in via Google, meaning a single compromise can expose both TikTok and Google accounts

  • The campaign likely spreads via targeted emails, building on tactics from earlier Google-themed scams


Background


This latest phishing operation continues a pattern of attackers targeting social media business accounts. TikTok for Business accounts are particularly valuable targets because they control advertising budgets and can reach millions of users. The platform itself has a history of being abused for spreading malicious links, infostealer malware, crypto scams, and direct messaging attacks. Earlier iterations of similar credential phishing campaigns were flagged in October 2025, suggesting this is an evolving threat rather than a new concept.


Campaign Mechanics


The attack chain uses multiple layers of deception to appear legitimate. Victims click a link that initially redirects from a legitimate Google Storage site, creating false credibility. The page then presents either a TikTok for Business or Google Careers "Schedule a call" interface asking for basic information. After users provide details, they're shown a malicious login page powered by an AITM phishing kit designed to capture credentials.


The Cloudflare Turnstile CAPTCHA check serves a dual purpose: it appears to add legitimacy while actually blocking automated security analysis tools and bots from detecting the phishing pages.


Infrastructure and Tactics


Attackers registered multiple domains following a consistent naming pattern, all hosted behind Cloudflare. Domains identified include welcome.careerscrews[.]com, welcome.careerstaffer[.]com, and others following the "welcome.careers" prefix structure. These domains are spun up and rotated extremely quickly, making traditional indicators of compromise nearly useless for detection and blocking.


Attack Impact and Value


Compromised TikTok for Business accounts unlock several profitable opportunities for attackers. They can run malicious advertisements, conduct ad fraud by diverting company advertising budgets for personal profit, harvest additional credentials, and distribute malware. The value multiplies when users log in through Google, as a single compromise grants access to both platforms and potentially other connected services.


Detection Challenges


The report notes that short-lived indicators of compromise provide limited value against modern phishing attacks. Attackers rotate infrastructure so quickly and dynamically serve different URLs to different visitors that traditional threat intelligence becomes stale almost immediately. This forces defenders to focus on behavioral detection and user awareness rather than blocking specific domains or URLs.


Sources


  • https://securityaffairs.com/190058/security/new-aitm-phishing-wave-hijacks-tiktok-business-accounts.html

  • https://thehackernews.com/2026/03/aitm-phishing-targets-tiktok-business.html

  • https://www.facebook.com/cybernewscom/posts/a-new-phishing-campaign-is-targeting-tiktok-business-usersphishing-tiktok/1539975074804845/

  • https://pushsecurity.com/blog/tiktok-phishing

  • https://www.facebook.com/groups/2600net/posts/4508292436060513/

  • https://www.reddit.com/r/blueteamsec/comments/1s4viq6/business_tiktok_accounts_targeted_with_aitm/

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page