Security researchers at Push Security have uncovered an ongoing, sophisticated phishing campaign specifically targeting TikTok for Business accounts. The attackers are using Adversary-in-the-Middle (AiTM) phishing kits, which are capable of bypassing multi-factor authentication (MFA) by hijacking user sessions in real-time. The campaign employs clever evasion techniques, including initial redirects from legitimate Google Storage URLs and the use of Cloudflare Turnstile challenges to weed out security bots. A successful attack results in the complete takeover of a business account, which can then be used to run malicious ad campaigns or distribute malware, posing a significant threat to businesses and their customers on the platform.
This campaign represents a significant evolution from traditional phishing attacks. By using an AiTM framework, the attackers are not just stealing static credentials; they are actively intercepting the entire login process, including the one-time codes used for MFA.
The attack chain is multi-staged and designed for stealth and effectiveness:
storage.googleapis.com URL. This Google Storage page then automatically redirects the victim to the actual phishing site. (T1566.002 - Spearphishing Link)T1539 - Steal Web Session Cookie)Compromise of a TikTok for Business account can have severe consequences:
tiktok.com domain in the address bar. Even if the page looks perfect, the URL is the key indicator. This aligns with D3FEND's URL Analysis (D3-UA).M1032 - Multi-factor Authentication)M1017 - User Training)Specifically implementing phishing-resistant MFA, such as FIDO2 security keys, is the most effective technical control against AiTM attacks.
Mapped D3FEND Techniques:
Educating users to scrutinize URLs and identify the signs of a phishing attempt is a crucial layer of defense.
Using web filters to block known malicious domains and those registered with suspicious registrars can prevent users from reaching the phishing site.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats