{"id":46342,"date":"2022-04-25T11:49:07","date_gmt":"2022-04-25T11:49:07","guid":{"rendered":"http:\/\/292cd682-6cc3-4ab0-860d-061aaea78dda"},"modified":"2022-04-25T11:49:07","modified_gmt":"2022-04-25T11:49:07","slug":"this-sneaky-phishing-attack-tries-to-steal-your-facebook-password","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\/","title":{"rendered":"This sneaky phishing attack tries to steal your Facebook password"},"content":{"rendered":"<div class=\"share-bar-wrapper\">\n<div class=\"full-byline\">\n<div class=\"author-avatars\"> <a rel=\"author\" class=\"thumb author-modal-open\" data-component=\"authorModal\" data-author-modal-options=\"{&quot;selector&quot;:&quot;danny-palmer-modal&quot;,&quot;hoverSelector&quot;:&quot;.full-byline&quot;}\" href=\"https:\/\/www.zdnet.com\/meet-the-team\/uk\/dannypalmerzdnet\/\"> <span class=\"img \"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/d31db2eb85c51031247ce810263a83caae1ca2c5\/2020\/02\/06\/6f24b751-729c-4ed9-9fae-979667f1d3b3\/dp-zdnet-headshot-feb-20201.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp\" class alt=\"Danny Palmer\" height=\"50\" width=\"50\"><\/span> <\/a> <\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p>A sneaky phishing campaign aims to steal passwords from Facebook users \u2013 including administrators of company Facebook Pages.&nbsp;<\/p>\n<p>Detailed by <a href=\"https:\/\/abnormalsecurity.com\/blog\/facebook-domain-credential-phishing-attack\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">cybersecurity researchers at Abnormal Security<\/a>, the attack begins with a <a href=\"https:\/\/www.zdnet.com\/article\/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\/\" target=\"_blank\" rel=\"noopener\">phishing email<\/a> claiming to be from &#8216;The Facebook Team&#8217;, which warns that the user&#8217;s account &#8220;might be disabled and your page might be removed&#8221; due to repeatedly posting content that has been reported as infringing the rights of another user. The victim is invited to appeal the report by clicking on a link that the security researchers said goes to a Facebook post \u2013 and within this post there&#8217;s another link that directs users to a separate website in order to make their &#8220;appeal&#8221;.<\/p>\n<p>As part of the fake appeals process, the user is asked to provide sensitive information, including their name and email address. Before submitting the form, the user is also asked to enter their Facebook password.&nbsp;<\/p>\n<p><strong>SEE:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/better-than-the-best-password-how-to-use-2fa-to-improve-your-security\/\" target=\"_blank\" rel=\"noopener\"><strong>Multi-factor authentication: How to enable 2FA to step up your security<\/strong><\/a><\/p>\n<p>All this information is sent to the attacker, who can use it to log in to the victim&#8217;s Facebook page, collect information from their account and potentially lock them out of it. If the victim&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/were-all-still-using-the-same-passwords-even-after-theyve-been-breached\/\" target=\"_blank\" rel=\"noopener\">re-uses their Facebook email address and password for other websites and applications<\/a>, the attacker can access those too.&nbsp;<\/p>\n<p>One of the reasons phishing attacks like this are successful is because they create a sense of urgency.<\/p>\n<p>&#8220;This is often enough to convince recipients to provide their personal information, particularly if they are using their Facebook account for business purposes,&#8221; said Rachelle Chouinard, threat intelligence analyst at Abnormal Security. &nbsp;<\/p>\n<p>What made this particular phishing campaign interesting to the security researchers was that it connected to a post on Facebook and that there was a link to a credential-phishing site within the post, which was disguised as a form to request an appeal.<\/p>\n<p>However, while the phishing email and phishing domain might&nbsp;have looked legitimate at first glance, there were clues that would have suggested that something might be off. &nbsp;<\/p>\n<p>For example, while the email contained Facebook branding and claimed to be from Facebook itself, the sender email address was not related to Facebook at all. In addition to this, attempting to reply to the sender email directs messages to an unrelated Gmail address.&nbsp;<\/p>\n<p>The language of the email is designed to create fear in the victim, scaring them into losing their account. It&#8217;s unlikely an actual online service will send an email like this, but if you receive a message and do get worried, don&#8217;t click the link in the email. Instead, log in to the website directly. If something is wrong with your account, you&#8217;ll be able to find out there \u2013 without handing your password to cyber criminals.&nbsp;<\/p>\n<p><strong>SEE: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/these-are-common-problems-that-cause-headaches-for-bug-bounty-participants\/#link=%7B%22linkText%22:%22These%20are%20the%20problems%20that%20cause%20headaches%20for%20bug%20bounty%20hunters%22,%22target%22:%22_blank%22,%22href%22:%22https:\/\/www.zdnet.com\/article\/these-are-common-problems-that-cause-headaches-for-bug-bounty-participants\/%22,%22role%22:%22standard%22,%22absolute%22:%22%22%7D\"><strong>These are the problems that cause headaches for bug bounty hunters<\/strong><\/a><\/p>\n<p>ZDNet contacted Facebook and the company pointed to advice to users on how to identify and report phishing attacks.&nbsp;<\/p>\n<p><a href=\"https:\/\/www.facebook.com\/help\/166863010078512\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Facebook&#8217;s Help Centre<\/a> says anyone who thinks that their account has been phished should report it, change their password, and \u2013 in the security settings \u2013 log out of any devices that they don&#8217;t recognise. &nbsp;<\/p>\n<p>It&#8217;s also recommended that users turn on <a href=\"https:\/\/www.facebook.com\/help\/148233965247823?helpref=faq_content\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">multi-factor authentication<\/a> to <a href=\"https:\/\/www.zdnet.com\/article\/two-factor-authentication-is-a-great-idea-but-not-enough-people-are-using-it\/\" target=\"_blank\" rel=\"noopener\">increase account security<\/a> against unauthorised logins. &nbsp;<\/p>\n<p>ZDNet also contacted Google \u2013 the company said the Gmail account used as part of the campaign has now been removed.&nbsp;<\/p>\n<h3><strong>MORE ON CYBERSECURITY<\/strong><\/h3>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Email tries to trick users with a warning that their account is going to be suspended.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-46342","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>This sneaky phishing attack tries to steal your Facebook password 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This sneaky phishing attack tries to steal your Facebook password 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-25T11:49:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/d31db2eb85c51031247ce810263a83caae1ca2c5\/2020\/02\/06\/6f24b751-729c-4ed9-9fae-979667f1d3b3\/dp-zdnet-headshot-feb-20201.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"This sneaky phishing attack tries to steal your Facebook password\",\"datePublished\":\"2022-04-25T11:49:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\\\/\"},\"wordCount\":591,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/d31db2eb85c51031247ce810263a83caae1ca2c5\\\/2020\\\/02\\\/06\\\/6f24b751-729c-4ed9-9fae-979667f1d3b3\\\/dp-zdnet-headshot-feb-20201.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\\\/\",\"name\":\"This sneaky phishing attack tries to steal your Facebook password 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/d31db2eb85c51031247ce810263a83caae1ca2c5\\\/2020\\\/02\\\/06\\\/6f24b751-729c-4ed9-9fae-979667f1d3b3\\\/dp-zdnet-headshot-feb-20201.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp\",\"datePublished\":\"2022-04-25T11:49:07+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/d31db2eb85c51031247ce810263a83caae1ca2c5\\\/2020\\\/02\\\/06\\\/6f24b751-729c-4ed9-9fae-979667f1d3b3\\\/dp-zdnet-headshot-feb-20201.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/d31db2eb85c51031247ce810263a83caae1ca2c5\\\/2020\\\/02\\\/06\\\/6f24b751-729c-4ed9-9fae-979667f1d3b3\\\/dp-zdnet-headshot-feb-20201.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"This sneaky phishing attack tries to steal your Facebook password\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This sneaky phishing attack tries to steal your Facebook password 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\/","og_locale":"en_US","og_type":"article","og_title":"This sneaky phishing attack tries to steal your Facebook password 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-04-25T11:49:07+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/d31db2eb85c51031247ce810263a83caae1ca2c5\/2020\/02\/06\/6f24b751-729c-4ed9-9fae-979667f1d3b3\/dp-zdnet-headshot-feb-20201.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"This sneaky phishing attack tries to steal your Facebook password","datePublished":"2022-04-25T11:49:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\/"},"wordCount":591,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/d31db2eb85c51031247ce810263a83caae1ca2c5\/2020\/02\/06\/6f24b751-729c-4ed9-9fae-979667f1d3b3\/dp-zdnet-headshot-feb-20201.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\/","url":"https:\/\/www.threatshub.org\/blog\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\/","name":"This sneaky phishing attack tries to steal your Facebook password 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/d31db2eb85c51031247ce810263a83caae1ca2c5\/2020\/02\/06\/6f24b751-729c-4ed9-9fae-979667f1d3b3\/dp-zdnet-headshot-feb-20201.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp","datePublished":"2022-04-25T11:49:07+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/d31db2eb85c51031247ce810263a83caae1ca2c5\/2020\/02\/06\/6f24b751-729c-4ed9-9fae-979667f1d3b3\/dp-zdnet-headshot-feb-20201.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/d31db2eb85c51031247ce810263a83caae1ca2c5\/2020\/02\/06\/6f24b751-729c-4ed9-9fae-979667f1d3b3\/dp-zdnet-headshot-feb-20201.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/this-sneaky-phishing-attack-tries-to-steal-your-facebook-password\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"This sneaky phishing attack tries to steal your Facebook password"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46342"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46342\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}