Attack spotlight

You’ve been invited to join a Meta for Business scam!

November 21, 2025

You’ve been invited to join a Meta for Business scam!

Credential phishing with fake and hijacked Meta for Business programs

Ready to see Sublime 
in action
Get a demo
Authors
Luke Wescott
Luke Wescott
Detection

Sublime’s Attack Spotlight series is designed to keep you informed of the email threat landscape by showing you real, in-the-wild attack samples, describing adversary tactics and techniques, and explaining how they’re detected. Get a live demo to see how Sublime prevents these attacks.

Email provider: Microsoft 365, Google Workspace

Attack type: credential phishing




The temperatures may be dropping, but Meta scams are only getting hotter. We've recently observed a dramatic increase in Meta for Business scams being used to steal credentials. These attacks fit into a broader increase in Meta/Facebook credential phishing scams that we’ve covered recently, including one using a fake Meta Ads Manager app and another using fake job recruiter outreach.

With access to these Meta accounts, bad actors could run their own ads to propagate attacks, resell ad space, gain access to any system that allows authentication via Meta login, and more. Let’s take a look at how this popular scam operates.

Phishing for Meta account credentials

This attack starts with an email sent from a legitimate Meta domain, like business.facebook[.]com or facebookmail[.]com. This message invites the target to join a legitimate (stolen) or legitimate-sounding (fake) business program like the Meta Professional Partner Program, Meta Media Agency, Meta Agency Credit Program, or similar.

Since the message is an actual invitation automatically sent from Meta for Business, the adversary puts the payload link early in the email. This is because the View invitation button link cannot be modified to be used as a payload delivery mechanism, so the target needs to be drawn to malicious link first. If the message were a spoof using a lookalike domain, they could put the malicious link right in the View invitation button.

The link at the top of the message is to a legitimate-sounding malicious domain, like profileportal.agency-partner-register[.]com, campaigns.agency-meta-program.com, and more.

Facebook
Meta credential phishing email sent via Meta for Business infrastructure

If the target clicks the link at the top of the email, they’re first taken to a Facebook/Meta splash screen, then to a landing page that emulates a Meta for Business page. In this example, the attacker uses a Meta Privacy Centre template. Notice that “Centre” is not en-US.

Meta
Fake Facebook/Meta splash page
Meta Privacy Centre
Landing page built from Meta Privacy Centre template\

In this version of the attack, none of the links work on the page other than Join Meta Agency Program button. Clicking this brings up a fake “Partnership Registration Form” for harvesting user information.

Fake regstration form
Fake registration form

This form does not perform account verification, which means this is not an adversary in the middle (AITM) attack, just simple harvesting.

Fake Registration form
Fake registration form with fake information

After clicking Send, a Meta password prompt appears.

Password Prompt
Password prompt

Since there is no actual verification going on, the attack instead uses a fake typo technique to get the target to enter their password a second time.

Fake error from password prompt
Fake error from password prompt

Interestingly, if the target enters a different password the second time, it will return the error again. This password prompt can only be cleared by entering the same password two times in a row. After that, they are prompted to enter the 2FA code they’ve been emailed.

Fake 2FA
Fake 2FA

While this attack may send an email to the target’s email address, again, there is no verification going on. Instead, if any code is entered, an error is returned. Only after entering the same code twice in a row will the target be able to continue.

Fake error from 2FA prompt
Fake error from 2FA prompt

Finally, the target receives a window confirming that their request to join the fake program has been sent.

Fake confirmation
Fake confirmation

Attack variations

As with most attacks, we have observed a variety of different TTPs for these Meta scams. For example, we have detected hidden, non-English language characters within messages (ex: Vietnamese), fake verified badge notifications, and attempts to also phish recovery codes.

Attack variants
Attack variants
Fake verified badge phishing workflow

While these attacks may vary, they all have shared detection signals.

Detection signals

Sublime's AI-powered detection engine prevented this attack. Some of the top signals for this attack were:

  • Deceptive domain: The phishing link is a non-Meta domain designed to sound like a legitimate program (profileportal.agency-partner-register[.]com).
  • Service abuse: The message was sent over Meta infrastructure and features valid links, but also includes a suspicious third-party domain, which is a common phishing tactic
  • Urgency: "Action required” in the subject line creates urgency.

ASA, Sublime’s Autonomous Security Analyst, flagged this email as malicious. Here is ASA’s analysis summary:

Detection signals

Stay safe from Meta abuse scams

Scams like this are effective because they use legitimate infrastructure to deliver malicious attacks. That’s why the most effective email security platforms are adaptive, using AI and machine learning to shine a spotlight on the suspicious indicators of the scam.

If you enjoyed this Attack Spotlight, be sure to check our blog every week for new blogs, subscribe to our RSS feed, or sign up for our monthly newsletter. Our newsletter covers the latest blogs, detections, product updates, and more.

Read more Attack Spotlights:

Heading

About the authors

Luke Wescott
Luke Wescott
Detection

Luke is a Threat Detection Engineer at Sublime. Holding a master’s degree in Machine Learning, he knows how to extract stories and meaning from data. He is committed to always improving, and is obsessed by the constantly-changing landscape of cybersecurity.

Get the latest

Sublime releases, detections, blogs, events, and more directly to your inbox.

check
Thank you!

Thank you for reaching out.  A team member will get back to you shortly.

Oops! Something went wrong while submitting the form.

Related Articles

December 18, 2025
How to build fast similarity search for email from the ground up
Sublime news

How to build fast similarity search for email from the ground up

Ross WolfPerson
Ross Wolf
Engineering
Person
December 16, 2025
Evolving our brand as Sublime grows
Sublime news

Evolving our brand as Sublime grows

Omar JalalzadaPerson
Omar Jalalzada
Head of Design
Kirk JohnsonPerson
Kirk Johnson
Creative Director
December 9, 2025
Automatic malicious calendar event remediation
Sublime news

Automatic malicious calendar event remediation

Ahry JeonPerson
Ahry Jeon
Product Manager
Person

Frequently asked questions

What is email security?
Email security refers to protective measures that prevent unauthorized access to email accounts and protect against threats like phishing, malware, and data breaches. Modern email security like Sublime use AI-powered technology to detect and block sophisticated attacks while providing visibility and control over your email environment.

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.

BG Pattern