A sophisticated phishing campaign targeting Facebook users has been detected, exploiting a critical zero-day vulnerability within Salesforce’s email services. This exploit enables malicious actors to craft highly tailored phishing messages utilizing Salesforce’s domain and infrastructure, significantly increasing the chances of success.

Researchers at Guardio Labs, Oleg Zaytsev and Nati Tal, reported that these phishing attempts cleverly navigate past traditional detection systems by exploiting both the Salesforce vulnerability and historical quirks in Facebook’s Web Games platform. The fraudulent emails appear to originate from Meta, leveraging a @salesforce.com address, thus creating a veneer of legitimacy aimed at deceiving recipients.

The phishing emails falsely inform users that their Facebook accounts are under a “comprehensive investigation” due to suspicious activities involving impersonation. The ultimate objective is to redirect users to a malicious landing page designed to harvest their account credentials and two-factor authentication (2FA) codes. Notably, this phishing operation is hosted on the Facebook apps platform, which utilizes the legitimate domain apps.facebook[.]com.

This intricate scheme eludes common anti-phishing defenses due to the use of valid links to facebook.com and an email address associated with a recognized provider like Salesforce, thereby undermining the typical filters employed by security systems. This tactic raises concerns, especially since Meta discontinued the Web Games feature in July 2020, although legacy support may continue for previously developed games.

While verification of emails from Salesforce typically involves robust security measures, the researchers indicate that this particular exploit circumvents those checks. Attackers configure an Email-to-Case routing address under the Salesforce domain and designate it as an organization-wide email address. This manipulation effectively triggers a verification flow, allowing the phishing email to slip through undetected.

The implications of this exploit are significant, as it opens the door for more extensive phishing campaigns that could specifically target Salesforce clients. With the potential for these emails to bypass standard security measures while even being marked as important by service providers like Google, the threat landscape is evolving.

Salesforce addressed this zero-day vulnerability shortly after receiving responsible disclosure from Guardio Labs on June 28, 2023, implementing new checks designed to block the misuse of @salesforce.com email addresses as of July 28, 2023.

This incident coincides with a broader warning from Cofense regarding rising phishing activities that exploit Google Accelerated Mobile Pages (AMP) URLs to bypass security protocols. It’s important to note that this is not the first instance of phishing notifications masquerading as Facebook communications. Previous reports from Trustwave highlighted similar social engineering attacks in late 2022, demonstrating a clear trend in utilizing legitimate services to facilitate malicious behavior.

As bad actors continue to find innovative methods to exploit existing systems, cybersecurity experts emphasize the criticality of vigilance and updated security measures. They highlight the disturbing trend of leveraging seemingly legitimate platforms such as customer relationship management systems, marketing tools, and cloud-based services for malicious intentions, underscoring the necessity for businesses to remain proactive in their cybersecurity strategies.