Security researchers at Push Security have uncovered an ongoing, sophisticated phishing campaign specifically targeting TikTok for Business accounts. The attackers are using Adversary-in-the-Middle (AiTM) phishing kits, which are capable of bypassing multi-factor authentication (MFA) by hijacking user sessions in real-time. The campaign employs clever evasion techniques, including initial redirects from legitimate Google Storage URLs and the use of Cloudflare Turnstile challenges to weed out security bots. A successful attack results in the complete takeover of a business account, which can then be used to run malicious ad campaigns or distribute malware, posing a significant threat to businesses and their customers on the platform.
This campaign represents a significant evolution from traditional phishing attacks. By using an AiTM framework, the attackers are not just stealing static credentials; they are actively intercepting the entire login process, including the one-time codes used for MFA.
The attack chain is multi-staged and designed for stealth and effectiveness:
storage.googleapis.com URL. This Google Storage page then automatically redirects the victim to the actual phishing site. (T1566.002 - Spearphishing Link)T1539 - Steal Web Session Cookie)Compromise of a TikTok for Business account can have severe consequences:
tiktok.com domain in the address bar. Even if the page looks perfect, the URL is the key indicator. This aligns with D3FEND's URL Analysis (D3-UA).M1032 - Multi-factor Authentication)M1017 - User Training)Specifically implementing phishing-resistant MFA, such as FIDO2 security keys, is the most effective technical control against AiTM attacks.
Mapped D3FEND Techniques:
Educating users to scrutinize URLs and identify the signs of a phishing attempt is a crucial layer of defense.
Using web filters to block known malicious domains and those registered with suspicious registrars can prevent users from reaching the phishing site.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.