Hackers exploited Salesforce zero-day in Facebook phishing attack

Teilen:

Hackers exploited a zero-day vulnerability in Salesforce’s email services and SMTP servers to launch a sophisticated phishing campaign targeting valuable Facebook accounts.

The attackers chained a flaw dubbed “PhishForce,” to bypass Salesforce’s sender verification safeguards and quirks in Facebook’s web games platform to mass-send phishing emails.

The benefit of using a reputable email gateway like Salesforce to distribute phishing emails is the evasion of secure email gateways and filtering rules, ensuring that the malicious emails reach the target’s inbox.

The campaign was discovered by Guardio Labs analysts Oleg Zaytsev and Nati Tal, who reported the unknown vulnerability to Salesforce and helped them with the remediation process.

However, the discovered issues in Facebook’s game platform are outstanding, as Meta’s engineers are still trying to figure out why the existing mitigations failed to stop the attacks.

PhishForce abused in attacks

The Salesforce CRM allows customers to send emails as their own brand using custom domains that the platform must first verify. This protects customers from sending out emails through Salesforce as other brands that they do not have permission to impersonate.

However, Guardio Labs says the attackers figured out a way to exploit Salesforce’s “Email-to-Case” feature, which organizations use for converting incoming customer emails to actionable tickets for their support teams.

Specifically, the attackers set up a new “Email-to-Case” flow to gain control of a Salesforce-generated email address, then created a new inbound email address on the “salesforce.com” domain.

Generated Salesforce address
Generated Salesforce address (Guardio Labs)

Next, they set that address as an “Organization-Wide Email Address,” which Salesforce’s Mass Mailer Gateway uses for outbound emails, and finally went through the verification process to confirm ownership of the domain.

Clicking on the verification link to confirm ownership
Clicking on the verification link to confirm ownership (Guardio Labs)

This process allowed them to use their Salesforce email address to send out messages to anyone, bypassing both Salesforce’s verification protections and any other email filters and anti-phishing systems in place.

Indeed, this is what Guardio Labs observed in the wild, with phishing emails that supposedly came from “Meta Platforms” using the “case.salesforce.com” domain.

Phishing email sampled from a real attack
Phishing email sampled from a real attack (Guardio Labs)

Clicking on the embedded button takes the victim to a phishing page hosted and displayed as part of the Facebook gaming platform (“apps.facebook.com”), which adds further legitimacy to the attack and makes it even harder for the email recipients to realize the fraud.

Phishing page hosted on the Facebook gaming platform
Phishing page hosted on the Facebook gaming platform (Guardio Labs)

The goal of the phishing kit employed in this campaign is to steal Facebook account credentials, even featuring two-factor authentication bypassing mechanisms.

The observed attack chain
The observed attack chain (Guardio Labs)

Meta still investigating

After confirming the issues by replicating the creation of a Salesforce-branded address capable of disseminating phishing emails, Guardio Labs notified the vendor of their discovery on June 28, 2023

Salesforce reproduced the vulnerability and resolved the problem exactly a month later, on July 28, 2023.

Regarding the abuse of “apps.facebook.com,” Guardio Labs notes that it should be impossible for the attackers to create the game canvass used as a landing page since Facebook retired this platform in July 2020.

However, legacy accounts that used the platform before its deprecation still have access, and threat actors might be paying a premium for those accounts on the dark web.

Meta removed the violating pages upon Guardio Labs’ report; however, its engineers are still investigating why existing protections failed to stop the attacks.

As phishing actors continue to explore every potential abuse opportunity on legitimate service providers, novel security gaps constantly threaten to expose users to severe risks.

Thus, it is essential not to rely solely on email protection solutions, and also scrutinize every email that lands on your inbox, look for inconsistencies, and double-check all claims made in those messages.

 

(c) Lawrence Abrams

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
5:36 pm, Juni 1, 2025
Wetter-Symbol 20°C
L: 19° | H: 21°
broken clouds
Luftfeuchtigkeit: 51 %
Druck: 1013 mb
Wind: 14 mph WSW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 67%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:49 am
Sonnenuntergang: 9:07 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
19° | 21°°C 0 mm 0% 12 mph 57 % 1013 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
11° | 21°°C 0 mm 0% 11 mph 79 % 1019 mb 0 mm/h
Di. Juni 03 10:00 pm
Wetter-Symbol
11° | 19°°C 1 mm 100% 16 mph 93 % 1014 mb 0 mm/h
Mi. Juni 04 10:00 pm
Wetter-Symbol
10° | 20°°C 0 mm 0% 13 mph 80 % 1010 mb 0 mm/h
Do. Juni 05 10:00 pm
Wetter-Symbol
12° | 18°°C 1 mm 100% 13 mph 95 % 1008 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
17° | 20°°C 0 mm 0% 12 mph 51 % 1013 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
16° | 19°°C 0 mm 0% 8 mph 57 % 1013 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
13° | 15°°C 0 mm 0% 6 mph 73 % 1014 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
11° | 11°°C 0 mm 0% 5 mph 79 % 1016 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
11° | 11°°C 0 mm 0% 9 mph 72 % 1018 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
16° | 16°°C 0 mm 0% 7 mph 51 % 1019 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
19° | 19°°C 0 mm 0% 8 mph 35 % 1018 mb 0 mm/h
Tomorrow 4:00 pm
Wetter-Symbol
21° | 21°°C 0 mm 0% 7 mph 30 % 1017 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€92,650.93
0.37%
Ethereum(ETH)
€2,235.36
-0.27%
Fesseln(USDT)
€0.88
0.00%
XRP(XRP)
€1.90
-1.14%
Solana(SOL)
€136.74
-0.80%
USDC(USDC)
€0.88
0.00%
Dogecoin(DOGE)
€0.170531
0.19%
Shiba Inu(SHIB)
€0.000011
2.17%
Pepe(PEPE)
€0.000011
1.43%
Peanut das Eichhörnchen(PNUT)
€0.233143
1.21%
Nach oben scrollen