Attack spotlight

Fake Meta Ads Manager in App Store and TestFlight used to phish Meta ad accounts

September 23, 2025

Fake Meta Ads Manager in App Store and TestFlight used to phish Meta ad accounts

Malicious fake Meta ads manager apps distributed via App Store and TestFlight beta

Ready to see Sublime 
in action
Get a demo
Authors
Brandon Webster
Brandon Webster
Detection
Threat Research Team
Threat Research Team
Sublime

Sublime’s Attack Spotlight series is designed to keep you informed of the email threat landscape by showing you real, in-the-wild attack samples, describing adversary tactics and techniques, and explaining how they’re detected. These attacks can be prevented with a free Sublime account.

EMAIL PROVIDER: Google Workspace

ATTACK TYPE: Malware/Ransomware, Credential Phishing

We recently detected a series of attacks that directed targets to download a fake Meta Ads Manager app to their Apple device. In the initial variants detected by Sublime, the attackers delivered the malicious app via a link from TestFlight, the beta testing platform from Apple. It was assumed that this was a tactic to bypass more rigorous App Store approval.

The TestFlight homepage states that betas are delivered via an emailed link: “To test beta versions of apps and App Clips using TestFlight, you’ll need to accept an email or public link invitation from the developer and have a device that you can use to test.” This allowed the actor to use the trust of TestFlight infrastructure to deliver the attack.

testflight.apple[.]com

Later, we discovered that a variant of the malicious app had gotten listed within the App Store. We reported the app to Apple and it was promptly removed. In this post, we’ll look at both versions of this attack:

The TestFlight variant

We saw a few different versions of the TestFlight-based attack, but all had similar tactics. They all were sent from freemail domains, each impersonated Meta, and they all directed the target to download Meta Ads Manager. In some cases, they explicitly stated the beta nature of the app, but in all cases the target was given a link to download from TestFlight.

Beta specifically mentioned
TestFlight specifically mentioned

If the target clicked the main CTA, they would be taken to the app’s TestPilot page. From there, they are directed to first download TestFlight from the App Store.

TestFlight landing page for the fake app

Once TestFlight is installed, they can then install the fake Meta Ads Manager (with name variation by attack) app.

Fake Meta Ads Manager app

The App Store variant

This version of the attack utilized most of the same tactics: Meta impersonation, freemail sender, etc.

Message with link to App Store

The main difference with this version of the attack was that the payload link took the target directly to the App Store, the most trustworthy app source for Apple devices:

App Store variant that is no longer listed

The payload

After reporting the app to Apple, it was quickly removed from the App Store, indicating that at worst, the app was malicious, and at the least, the app was illegitimate. Additionally, while researching this attack, we found compelling evidence to indicate that this was a credential phishing app.

Detection signals for TestFlight variant

Sublime's AI-powered detection engine prevented these attacks. Some of the top signals for the TestFlight variant of the attack were:

  • Brand impersonation: The email uses Meta's name and logo while sending from an unrelated Gmail account.
  • Freemail + first-time sender: The message was sent using a Gmail account from a sender that has never previously corresponded with the target’s company.
  • Homoglyph substitution in subject: The subject has a lowercase L substituted for an uppercase I in “Meta lnc.” to evade detection. (upper(lnc) = LNC)
  • Non-functional footer: Dead links in the footer indicate a lack of regulatory compliance, further indicating impersonation.
  • App installation: The message is directing the target to install a TestFlight app.

ASA, Sublime’s Autonomous Security Analyst, flagged this variant as malicious. Here is ASA’s analysis summary:

Detection signals for App Store variant

Some of the top signals for the App Store variant of the attack were:

  • Brand impersonation: The email uses Meta's name and logo while sending from an unrelated Gmail account.
  • Suspicious display name: Meta used in sender’s display name to create false legitimacy
  • Freemail + first-time sender: The message was sent using a Gmail account from a sender that has never previously corresponded with the target’s company.
  • App installation: The message is directing the target to install an app from the App Store.

Here is ASA’s analysis summary:

Keep bad apps out of your inbox

While the scope of malware is extending from computers to personal devices, email can still be used to deliver the payload. That’s why the most effective email security platforms are adaptive, using AI and machine learning to shine a spotlight on seemingly minor discrepancies.

If you enjoyed this Attack Spotlight, be sure to check our blog every week for new blogs, subscribe to our RSS feed, or sign up for our monthly newsletter. Our newsletter covers the latest blogs, detections, product updates, and more.

Read more Attack Spotlights:

Heading

About the authors

Brandon Webster
Brandon Webster
Detection

Brandon is an Email Security Analyst at Sublime. Having a naturally sharp eye for details, patterns, and anomalies, he enjoys honing his skills in the ever-changing landscape of threat detection and prevention.

Threat Research Team
Threat Research Team
Sublime

The Threat Research team at Sublime is responsible for performing deep dive analyses of new and evolving threats. They use cutting-edge tools and open-source intelligence to understand the full scope of threats and threat actors.

Get the latest

Sublime releases, detections, blogs, events, and more directly to your inbox.

check
Thank you!

Thank you for reaching out.  A team member will get back to you shortly.

Oops! Something went wrong while submitting the form.

Related Articles

December 29, 2025
5 email security trends from 2025
Sublime news

5 email security trends from 2025

Brian BaskinPerson
Brian Baskin
Threat Research
Person
December 18, 2025
How to build fast similarity search for email from the ground up
Sublime news

How to build fast similarity search for email from the ground up

Ross WolfPerson
Ross Wolf
Engineering
Person
December 16, 2025
Evolving our brand as Sublime grows
Sublime news

Evolving our brand as Sublime grows

Omar JalalzadaPerson
Omar Jalalzada
Head of Design
Kirk JohnsonPerson
Kirk Johnson
Creative Director

Frequently asked questions

What is email security?
Email security refers to protective measures that prevent unauthorized access to email accounts and protect against threats like phishing, malware, and data breaches. Modern email security like Sublime use AI-powered technology to detect and block sophisticated attacks while providing visibility and control over your email environment.

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.

BG Pattern