LIVE NEWSROOM · --:-- · May 22, 2026
A LIBRARY FOR SECURITY RESEARCHERS

30,000 Facebook Business Accounts Compromised via Google AppSheet Phishing Relay

Post on X LinkedIn
30,000 Facebook Business Accounts Compromised via Google AppSheet Phishing Relay

A Vietnamese-linked threat operation dubbed AccountDumpling by Guardio has compromised approximately 30,000 Facebook Business accounts by routing phishing emails through Google AppSheet, causing them to originate from the legitimate noreply@appsheet.com address and bypass enterprise spam filters. The campaign targets Facebook Business account owners with fake Meta Support termination notices and funnels stolen credentials to Telegram-based collection bots for resale.

// 01 AccountDumpling Phishing: What We Know So Far

The attack chain abuses legitimate platform functionality rather than a software vulnerability — there is no CVE associated with this campaign.

Phishing emails are sent through Google AppSheet’s notification infrastructure, meaning they arrive from noreply@appsheet.com, a Google-controlled domain with strong DMARC, DKIM, and SPF alignment. The emails claim to be from Meta Support, warning recipients that their Facebook Business account faces permanent deletion unless they submit an appeal immediately. The urgency framing is designed to cause recipients to act without pausing to verify the sender context.

Victims who click through land on credential-harvesting pages that mimic Meta’s account appeal workflow. Submitted credentials and session tokens are captured in real time by Telegram bots and streamed to attacker-controlled channels. The stolen accounts are sold through an illicit storefront operated by the threat actors. In a secondary monetization loop, the attackers also offer “account recovery” services to victims — charging a fee to return an account they themselves stole.

Attribution is based on metadata from a Google Drive-hosted PDF used in the campaign, which identifies a Vietnamese national named “Phạm Tài Tân” — a persona linked to online offers of Facebook account recovery services. Geographic distribution of victims skews heavily toward the United States (approximately 68%), with the remainder across Europe, Asia, and the Americas. Guardio, which published the original research, has codenamed the operation AccountDumpling.

// 02 Why AccountDumpling Phishing Matters

This campaign represents a maturation of the “trusted platform abuse” technique, where attackers leverage the sending reputation of legitimate cloud services to defeat email security controls. AppSheet is a Google-owned no-code application platform; emails from its notification infrastructure carry the full trust chain of Google’s mail infrastructure. Most secure email gateways and spam filters will not flag or quarantine them.

The specific targeting of Facebook Business accounts is deliberate. Business accounts carry advertising credits, audience data, customer payment methods, and the ability to manage paid social campaigns. A compromised Business Manager account can result in unauthorized ad spend accumulating rapidly — sometimes thousands of dollars within hours — before the breach is detected.

The monetization model — steal, resell, and optionally “recover” for a fee — indicates a mature criminal operation rather than opportunistic account harvesting. The use of Telegram infrastructure for real-time credential collection means stolen sessions are acted upon before the victim has any chance to revoke them.

// 03 AccountDumpling Phishing: What You Should Do Now

  • Enforce phishing-resistant MFA on all Facebook Business accounts. FIDO2 hardware keys or passkeys eliminate adversary-in-the-middle (AiTM) credential relay even when an employee lands on a convincing phishing page. SMS-based OTP does not stop this type of attack — the token is captured in real time and relayed before it expires.
  • Review Business Manager login activity now. Navigate to Business Settings → Security Center → Recent Logins. Look for unfamiliar IP addresses, geolocations outside your organization’s normal operating regions, and session tokens generated outside business hours.
  • Restrict Business Manager access using least privilege. Revoke admin-level roles from any account that does not require them. Ad managers should not have access to payment settings or user management by default.
  • Train employees to distrust any Meta Support email regardless of sender domain. The AppSheet origin makes this campaign unusually convincing. Meta does not use Google AppSheet to manage account appeals. Establish clear policy: any email directing employees to log into Meta via a link should be verified through a separate channel before clicking.
  • Create an email filtering rule for noreply@appsheet.com messages containing Facebook-related language. Flag or sandbox these messages for manual review in your email security platform. This is a targeted rule that will not block legitimate AppSheet use in other contexts.

// 04 Detection and Verification Checklist

  • Facebook Business Manager: Go to Business Settings → Security Center → Recent Logins. Filter for sessions originating from Southeast Asian IP ranges, residential proxies, or unfamiliar geolocations.
  • Active user audit: Business Settings → People. Look for accounts added as Business Manager admins in the past 30 days that were not authorized through your normal provisioning process.
  • Ad spend monitoring: Enable billing alerts in Ads Manager. Sudden spikes in Facebook Ads spend that do not correspond to approved campaigns should trigger immediate account access review.
  • Secondary admin check: Attackers add a backdoor admin account immediately after compromise to maintain access after a password reset. Confirm all admin-role users in Business Manager are legitimate.
  • AppSheet email verification: If your organization does not use Google AppSheet, any email from noreply@appsheet.com should be treated as high-suspicion. If you do use AppSheet, verify that any Meta-related content in AppSheet emails is authorized.

Sources: The Hacker News, SC Media, CyberInsider, NJCCIC

For any query contact us at contact@cipherssecurity.com

    TE
    Team Ciphers Security

    The Ciphers Security editorial team — practitioners covering daily threat intel, CVE deep-dives, and hands-on cybersecurity research. About us →

    Previous SHADOW-EARTH-053: China-Aligned Hackers Target Asian Governments and NATO Member State Next Cyber-Enabled Cargo Theft Hit $725M in 2025 as FBI Warns Transportation Sector

    Latest News

    YARA-X 1.16.0: Faster Scans, Panic Fixes, and Neovim LSP Support YARA-X 1.16.0 ships with performance improvements across 10 PRs, constant folding for bitwise ops, configurable mat… Instructure Removed from ShinyHunters' Leak Site as Canvas Breach Deadline Passes Instructure was quietly removed from ShinyHunters' extortion site after the May 12, 2026 deadline — no data dump, n… Costa Rica Joins Have I Been Pwned as the 42nd Government Costa Rica's CSIRT gains free access to Have I Been Pwned's government domain monitoring service, becoming the 42nd… LummaC2 Infostealer Targets US Critical Infrastructure: CISA-FBI Advisory AA25-141B and DOJ Domain Seizures CISA and FBI advisory AA25-141B details LummaC2 MaaS infostealer TTPs targeting critical infrastructure. DOJ seized… MacSync Stealer: Hackers Abuse Google Ads and Claude.ai Chats to Push Mac Malware Russian-speaking attackers combine Google Ads and Claude.ai shared chats in a ClickFix campaign deploying MacSync S… JDownloader Site Hacked, Installers Swapped with Python RAT Malware JDownloader's website was hacked May 6–7, 2026, replacing Windows and Linux installers with a Python-based RAT. Use… Operation HookedWing: 4-Year Phishing Campaign Hits 500+ Organizations Across Aviation, Energy, and Logistics Operation HookedWing has stolen credentials from 500+ organizations in aviation, energy, logistics, and critical in… Twelve Critical vm2 Node.js Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution A dozen CVEs in the vm2 Node.js sandbox library — including CVSS 10.0 flaws — allow sandbox escape and RCE. Update …
    Scroll to Top
    Ad