Description

A large-scale phishing campaign is targeting users of Meta Business Suite (MBS), leveraging legitimate Meta infrastructure to harvest login credentials across thousands of small- and medium-sized businesses worldwide. The attack bypasses typical email-security filters by exploiting native business-invitation functionality rather than using obviously spoofed domains. Researchers at Check Point Research observed around 40,000 phishing emails sent to over 5,000 customers across multiple sectors (automotive, education, real-estate, hospitality, finance) in the U.S., Europe, Canada and Australia. The attackers set up bogus Facebook Business pages displaying Meta branding, then used the business-invitation feature within MBS to send invites from the legitimate domainfacebookmail.com, making the messages appear trustworthy. Recipients clicking the invitation link were redirected to credential-harvesting pages hosted on domains such as vercel.app. Because the messages came from a legitimate Meta domain and used genuine business-tool features, conventional sender-domain checks and phishing filters were largely bypassed. Users were urged via language like “Action Required”, “You’re Invited to Join the Free Advertising Credit Program”, or “Account Verification Required” to click links.