By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Philly PI
LIVE
Subscribe
DONATE
DONATE
Subscribe
SIGN IN
SECTIONS
  • Sports
  • Philly Pulse
  • Business
  • Science & Tech
  • Politics
  • Entertainment
Reading: New AITM phishing wave hijacks TikTok Business accounts
Philly PI
LIVE
Subscribe
DONATE
DONATE
Subscribe
SIGN IN
bitcoin
Bitcoin (BTC) $ 77,680.00 0.10%
ethereum
Ethereum (ETH) $ 2,316.86 0.35%
solana
Solana (SOL) $ 86.57 0.90%
bnb
BNB (BNB) $ 630.97 1.02%
dogecoin
Dogecoin (DOGE) $ 0.098458 1.03%
cardano
Cardano (ADA) $ 0.250947 0.53%
tron
TRON (TRX) $ 0.323183 1.00%
monero
Monero (XMR) $ 369.95 0.84%
litecoin
Litecoin (LTC) $ 56.49 0.50%
kucoin-shares
KuCoin (KCS) $ 8.51 0.88%
binance-bridged-usdc-bnb-smart-chain
Binance Bridged USDC (BNB Smart Chain) (USDC) $ 0.999945 0.02%
jupiter-exchange-solana
Jupiter (JUP) $ 0.173014 0.08%
SECTIONS
  • Sports
  • Philly Pulse
  • Business
  • Science & Tech
  • Politics
  • Entertainment
Reading: New AITM phishing wave hijacks TikTok Business accounts
Saturday, Apr 25, 2026
LIVE
Subscribe
Donate
Philly PI
Donate
bitcoin
Bitcoin (BTC) $ 77,680.00 0.10%
ethereum
Ethereum (ETH) $ 2,316.86 0.35%
solana
Solana (SOL) $ 86.57 0.90%
bnb
BNB (BNB) $ 630.97 1.02%
dogecoin
Dogecoin (DOGE) $ 0.098458 1.03%
cardano
Cardano (ADA) $ 0.250947 0.53%
tron
TRON (TRX) $ 0.323183 1.00%
monero
Monero (XMR) $ 369.95 0.84%
litecoin
Litecoin (LTC) $ 56.49 0.50%
kucoin-shares
KuCoin (KCS) $ 8.51 0.88%
binance-bridged-usdc-bnb-smart-chain
Binance Bridged USDC (BNB Smart Chain) (USDC) $ 0.999945 0.02%
jupiter-exchange-solana
Jupiter (JUP) $ 0.173014 0.08%
  • Philly Pulse
  • Business
  • Politics & World
  • Sports
  • Entertainment
  • Donate
Search
  • Philly Pulse
  • Business
  • Tech & Science
  • Politics & World
  • Gaming
  • Sports
  • Shopping
Have an existing account? Sign In
Follow US
© 2026 The Philadelphia Post-Intelligencer.
The Legend Transcends: Honoring the Life and Legacy of Chuck Norris

The Legend Transcends: Honoring the Life and Legacy of Chuck Norris

The Ultimate Game-Changer: Why Sony’s ‘Wierd’ Handheld is Actually a Must-Have

The Ultimate Game-Changer: Why Sony’s ‘Wierd’ Handheld is Actually a Must-Have

The test the US cannot afford to fail

The test the US cannot afford to fail

AWACS Loss Send Shockwaves Through Defense Circles

AWACS Loss Send Shockwaves Through Defense Circles

Italy’s Deputy PM Condemns Rome Gala for Barring Russian Prima Ballerina

Italy’s Deputy PM Condemns Rome Gala for Barring Russian Prima Ballerina

Hacking

New AITM phishing wave hijacks TikTok Business accounts

New AITM phishing wave hijacks TikTok Business accounts
By
Tommy Graham
April 4, 2026
3 Min Read
Share

A new AITM phishing campaign targets TikTok Business accounts to hijack them for malvertising, continuing tactics seen in earlier Google-themed scams.

Push Security researchers uncovered a new wave of AITM phishing pages targeting TikTok for Business accounts, aiming to hijack them for malvertising. The campaign includes TikTok and Google-themed fake pages, showing links to previous operations. Once compromised, accounts are used to run malicious ads, steal credentials, spread malware, and conduct ad fraud, diverting company advertising budgets for profit.

Attackers used newly registered domains created within seconds and hosted behind Cloudflare. The pages follow a common naming pattern and redirect victims from legitimate services before loading fake TikTok for Business or Google “Schedule a call” pages.

image 85

Users are asked to fill in basic details, then shown a malicious login page powered by an AITM phishing kit. The campaign uses bot protection to evade detection and likely spreads via targeted emails, similar to past operations.


What do you think? Post a comment.


“When the link is first clicked, the page is silently redirected from a legitimate Google Storage site before loading the page.” reads the report published by Push Security. “A Cloudflare Turnstile check is used to prevent security bots from analyzing the page, before loading either a TikTok or Google themed page. Progressing through the forms ultimately serves up an AITM phishing page.”

- Advertisement -

EXPLORE MORE

Robot Wars over Iraq: U.S. ‘Coyote’ Drone Smashes Iranian Kamikaze in Mid-Air

Robot Wars over Iraq: U.S. ‘Coyote’ Drone Smashes Iranian Kamikaze in Mid-Air

The skies over Erbil, Iraq, looked like a scene from a sci-fi…

Indianapolis: Councilor’s Home Targeted with Gunfire Over Data Center Dispute

Indianapolis: Councilor’s Home Targeted with Gunfire Over Data Center Dispute

A neighborhood dispute over technological infrastructure took a violent and "deeply unsettling"…

Rescue Under Fire: U.S. CSAR Teams Targeted by Ground Fire in High-Stakes Mission Over Iran

Rescue Under Fire: U.S. CSAR Teams Targeted by Ground Fire in High-Stakes Mission Over Iran

KHUZESTAN PROVINCE, IRAN – U.S. combat search-and-rescue (CSAR) teams faced intense hostility…

The “Madman” and the Resignation: General Randy George’s Abrupt Exit from the Pentagon

The “Madman” and the Resignation: General Randy George’s Abrupt Exit from the Pentagon

The Pentagon is currently a house of cards in a windstorm. In…

The Isfahan Incursion: Inside the Most Daring U.S. Special Ops Rescue Since “Eagle Claw”

The Isfahan Incursion: Inside the Most Daring U.S. Special Ops Rescue Since “Eagle Claw”

The mountains of southern Iran just played host to a military operation…

Google links Axios npm supply chain attack to North Korea-linked APT UNC1069

Google links Axios npm supply chain attack to North Korea-linked APT UNC1069

Google links the Axios npm supply chain attack to North Korean threat…

image 86

By combining trusted branding, redirects, and layered deception, attackers increase success rates and harvest credentials for further abuse, including account takeover and fraud.

While phishing campaigns usually mimic platforms like Google or Microsoft, targeting TikTok is becoming more common.

The platform has long been used to spread malicious links and social engineering content, including videos that trick users into installing infostealers like Vidar or StealC. It is also widely abused for crypto scams and direct attacks via messages. Gaining access to TikTok business accounts is especially valuable, as they can be used for malvertising and fraud.

Many users log in via Google, meaning a single compromise can expose both TikTok and Google accounts, enabling broader abuse such as ad fraud, data theft, and access to other connected services.

The report also includes Indicators of Compromise (IoCs) for this campaign.

“Short-lived IoCs are of limited value when tackling modern phishing attacks due to the rate at which attackers are able to quickly spin up and rotate the sites used in the attack chain, often dynamically serving different URLs to site visitors.” concludes the report.



TAGGED:Account Takeover Malvertising FraudAiTM Phishing Attacks TikTokCloudflare Turnstile Phishing BypassCybersecurity News April 2026Google Login Phishing TikTokGoogle Storage Redirect PhishingIndicators Of Compromise TikTok PhishingInfostealer Malware TikTokMalicious Ads TikTok HijackMalvertising Hijack TikTok AccountsPhishing Kit Detection 2026Push Security Phishing ReportSocial Engineering TikTok BusinessTikTok Business Phishing Campaign 2026TikTok For Business Security Threats
Share This Article
Facebook Telegram Threads Copy Link Print

CONVERSATION

Subscribe
Connect with
Login
I allow to create an account
When you login first time using a Social Login button, we collect your account public profile information shared by Social Login provider, based on your privacy settings. We also get your email address to automatically create an account for you in our website. Once your account is created, you'll be logged-in to this account.
DisagreeAgree
Notify of
guest
Connect with
I allow to create an account
When you login first time using a Social Login button, we collect your account public profile information shared by Social Login provider, based on your privacy settings. We also get your email address to automatically create an account for you in our website. Once your account is created, you'll be logged-in to this account.
DisagreeAgree
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

You Might Also Like

Recent Navia data breach impacts HackerOne employee data
Hacking

Recent Navia data breach impacts HackerOne employee data

By
Tommy Graham
6 Min Read
Russian authorities arrest alleged LeakBase admin behind stolen data marketplace
Hacking

Russian authorities arrest alleged LeakBase admin behind stolen data marketplace

By
Tommy Graham
3 Min Read
U.S. CISA adds a Langflow flaw to its Known Exploited Vulnerabilities catalog
Hacking

U.S. CISA adds a Langflow flaw to its Known Exploited Vulnerabilities catalog

By
Tommy Graham
2 Min Read
U.S. CISA adds an Aquasecurity Trivy flaw to its Known Exploited Vulnerabilities catalog
Hacking

U.S. CISA adds an Aquasecurity Trivy flaw to its Known Exploited Vulnerabilities catalog

By
Tommy Graham
2 Min Read
Google fixes fourth actively exploited Chrome zero-day of 2026
Hacking

Google fixes fourth actively exploited Chrome zero-day of 2026

By
Tommy Graham
2 Min Read
U.S. CISA adds a flaw in Google Dawn to its Known Exploited Vulnerabilities catalog
Hacking

U.S. CISA adds a flaw in Google Dawn to its Known Exploited Vulnerabilities catalog

By
Tommy Graham
3 Min Read

Philly PI Newsletter

Brings you a selection of the latest news, trends, insights, and tips from around the world.

You’ve been successfully subscribed to our newsletter!

Philly PI

Sections & Features

  • Philly Pulse
  • Business
  • Tech & Science
  • Politics & World
  • Gaming
  • Sports
  • Shopping


  • Entertainment
  • Tech
  • Health
  • Fact Check
  • Crime Report

In-Focus

  • Iran War
  • Indie Vanguard Awards Hub
  • On air
  • Donate
  • Join Us
  • Advertise
  • Write for The Philly PI
  • Privacy Policy
  • Terms Of Use
  • Subscription Terms
  • Sitemap
  • Philly Pulse
  • Business
  • Politics & World
  • Sports
  • Entertainment
  • Donate

© 2026 The Philadelphia Post-Intelligencer. All Rights Reserved. The Philadelphia Post-Intelligencer is your trusted source for comprehensive and balanced news coverage. With a commitment to integrity and accuracy, we provide in-depth reporting that uncovers the stories that matter most.

The Philly PI Newsletter
  • Daily Stories
  • Stock Arlets
  • Full Acess
Subscribe to our newsletter to get our newest articles instantly!

You’ve been successfully subscribed to our newsletter!

$300
Raised
0
Donations
$600
Goal
50%
$

The Philly PI Newsletter
  • Daily Stories
  • Stock Arlets
  • Full Acess
Subscribe to our newsletter to get our newest articles instantly!

You’ve been successfully subscribed to our newsletter!

$300
Raised
0
Donations
$600
Goal
50%
$

The Philly PI Newsletter
  • Daily Stories
  • Stock Arlets
  • Full Acess
Subscribe to our newsletter to get our newest articles instantly!

You’ve been successfully subscribed to our newsletter!

$300
Raised
0
Donations
$600
Goal
50%
$

wpDiscuz
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?

Not a member? Sign Up