Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion

0
Medium
Published: Fri Mar 27 2026 (03/27/2026, 18:58:14 UTC)
Source: AlienVault OTX General

Description

A new phishing campaign is targeting TikTok for Business accounts using adversary-in-the-middle (AitM) techniques. The attackers employ Cloudflare Turnstile to evade detection and create convincing lookalike pages impersonating TikTok for Business or Google Careers. Victims are tricked into clicking malicious links, leading to credential theft. The campaign aims to seize control of business accounts, which can be used for malvertising and malware distribution. Multiple domains are involved in hosting the phishing pages. Additionally, a separate campaign using SVG file attachments to deliver malware has been observed in Venezuela, with potential links to BianLian ransomware activity.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 20:01:39 UTC

Technical Analysis

This threat involves a sophisticated phishing campaign targeting TikTok for Business accounts through adversary-in-the-middle (AitM) attacks. The attackers create convincing lookalike web pages that mimic legitimate TikTok for Business or Google Careers login portals. To evade detection by security tools and automated filters, the campaign employs Cloudflare Turnstile, a CAPTCHA alternative designed to distinguish humans from bots, which attackers abuse to bypass anti-bot protections. Victims are lured via social engineering tactics into clicking malicious links hosted on multiple domains such as welcome.careerscrews.com and other similarly named domains. Once credentials are harvested, attackers gain control over TikTok business accounts, which can be exploited for malvertising campaigns or to distribute malware further. The campaign also includes a separate malware delivery vector observed in Venezuela, where SVG file attachments are used to deploy malware potentially associated with BianLian ransomware activity, indicating a multi-faceted threat actor approach. The campaign leverages known malware families like Aura Stealer, Vidar, and Stealc, and employs various MITRE ATT&CK techniques including phishing (T1566), credential access (T1078), and adversary-in-the-middle tactics (T1557). The absence of a CVE or known exploit in the wild suggests this is an emerging threat, but its use of advanced evasion and social engineering techniques makes it a credible risk to organizations relying on TikTok for Business platforms.

Potential Impact

The primary impact of this threat is the compromise of TikTok for Business accounts, which can lead to unauthorized access and control over advertising campaigns, potentially resulting in financial losses, reputational damage, and the spread of malware or malicious advertisements to end users. Credential theft can also facilitate lateral movement within organizations if reused credentials are present elsewhere. The use of Cloudflare Turnstile evasion increases the likelihood of phishing success by circumventing automated defenses, making detection and prevention more challenging. The secondary malware campaign in Venezuela linked to BianLian ransomware indicates a risk of ransomware infection, data encryption, and operational disruption in affected regions. Globally, organizations with significant TikTok for Business usage are at risk of targeted phishing attacks, which could undermine trust in digital advertising platforms and cause broader cybersecurity incidents if attackers leverage stolen credentials for further attacks.

Mitigation Recommendations

Organizations should implement multi-factor authentication (MFA) on TikTok for Business accounts to reduce the risk of account takeover even if credentials are compromised. Security teams should monitor for suspicious login attempts and unusual account activity. Email and web filtering solutions must be updated to detect and block phishing domains identified in this campaign, including the listed welcome.careers*.com domains. User awareness training should emphasize the risks of phishing, especially regarding social engineering tactics that mimic legitimate services like TikTok and Google Careers. Deploy advanced threat detection tools capable of identifying adversary-in-the-middle phishing techniques and evasion methods such as Cloudflare Turnstile abuse. Incident response plans should include procedures for rapid credential revocation and account recovery. For the malware campaign in Venezuela, organizations should restrict or monitor SVG file attachments, implement endpoint detection and response (EDR) solutions, and maintain up-to-date ransomware defenses. Regular threat intelligence sharing and collaboration with cybersecurity communities can improve detection and response capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://thehackernews.com/2026/03/aitm-phishing-targets-tiktok-business.html"]
Adversary
null
Pulse Id
69c6d346df59de3f16b61387
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainwelcome.careerscrews.com
domainwelcome.careersengage.com
domainwelcome.careersgrower.com
domainwelcome.careersprogress.com
domainwelcome.careersstaffgrid.com
domainwelcome.careerssuccess.com
domainwelcome.careerstaffer.com
domainwelcome.careerstransform.com
domainwelcome.careersupskill.com
domainwelcome.careersworkflow.com

Threat ID: 69c6de343c064ed76fea1be2

Added to database: 3/27/2026, 7:44:52 PM

Last enriched: 3/27/2026, 8:01:39 PM

Last updated: 3/28/2026, 1:41:49 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses