Beware of Fake Meta Email’s From Hackers That Steal Your Ad Account Login’s

A dangerous new phishing campaign targeting businesses that use Meta platforms for advertising has been discovered.

The scam begins with users receiving an urgent email claiming “YOUR ADS ARE TEMPORARILY SUSPENDED” due to alleged violations of Instagram’s Advertising Policies and EU regulations, including GDPR.

These messages create immediate concern for businesses that rely on social media marketing, prompting them to click on the included “Check more details” button to resolve the issue quickly.

Google News

The fraudulent emails are designed to appear legitimate at first glance, with Instagram branding and official-sounding language about policy violations.

However, closer inspection reveals the messages come from suspicious domains like “[email protected]” rather than official Meta addresses.

The email contains threatening language about account suspension and removal of promotional content to create urgency.

Initial Infection URL Landing Page (Source – Cofense)

Cofense researchers identified that upon clicking the deceptive link, users are redirected to a convincing but fake Meta Business page with a URL “businesshelpmanager.com” that mimics legitimate Meta support sites.

The page warns that the account faces suspension and termination if action isn’t taken immediately.

What makes this attack particularly sophisticated is its two-pronged approach to account takeover. Users are either guided through a fake support chat experience or provided with step-by-step instructions claiming to help restore their account access.

In both cases, the end goal is the same – tricking users into adding the attacker’s authenticator app labeled “SYSTEM CHECK” as a two-factor authentication method for their Meta Business account.

Chatbot – Initial Conversation (Source – Cofense)

The chat support experience is especially convincing, with attackers asking for business account screenshots, explaining the supposed violations, and requesting personal information from victims.

Chatbot – Business Page Screenshot (Source – Cofense)

While all these interactions in this report appear legitimate to the unsuspecting users.

Chatbot – Flag Reason & Personal Info Screenshot (Source – Cofense)

Technical Details of the Attack

The attack culminates when victims are instructed to click an “Activate System Check” button that resets their session and prompts them to enter their Facebook password on a convincing phishing page.

Meta Phishing Page (Source – Cofense)

The attackers have created a highly detailed replica of Meta’s authentication system to harvest credentials.

The campaign uses multiple domain redirects and sophisticated social engineering techniques to bypass traditional security measures.

According to Cofense’s analysis, the attack infrastructure includes several IP addresses linked to the phishing domains, including 44.238.235.1 and 52.35.19.120.

To protect yourself, always verify the sender address of emails claiming to be from Meta, check URLs before entering credentials, and contact Meta directly through official channels if you suspect your advertising account has issues.

Never follow instructions to add unknown authenticator apps to your account, as this grants attackers persistent access even if you later change your password.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Tushar Subhra Dutta
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.