Hackers exploited Salesforce zero-day in Facebook phishing attack

Teilen:

Hackers exploited a zero-day vulnerability in Salesforce’s email services and SMTP servers to launch a sophisticated phishing campaign targeting valuable Facebook accounts.

The attackers chained a flaw dubbed “PhishForce,” to bypass Salesforce’s sender verification safeguards and quirks in Facebook’s web games platform to mass-send phishing emails.

The benefit of using a reputable email gateway like Salesforce to distribute phishing emails is the evasion of secure email gateways and filtering rules, ensuring that the malicious emails reach the target’s inbox.

The campaign was discovered by Guardio Labs analysts Oleg Zaytsev and Nati Tal, who reported the unknown vulnerability to Salesforce and helped them with the remediation process.

However, the discovered issues in Facebook’s game platform are outstanding, as Meta’s engineers are still trying to figure out why the existing mitigations failed to stop the attacks.

PhishForce abused in attacks

The Salesforce CRM allows customers to send emails as their own brand using custom domains that the platform must first verify. This protects customers from sending out emails through Salesforce as other brands that they do not have permission to impersonate.

However, Guardio Labs says the attackers figured out a way to exploit Salesforce’s “Email-to-Case” feature, which organizations use for converting incoming customer emails to actionable tickets for their support teams.

Specifically, the attackers set up a new “Email-to-Case” flow to gain control of a Salesforce-generated email address, then created a new inbound email address on the “salesforce.com” domain.

Generated Salesforce address
Generated Salesforce address (Guardio Labs)

Next, they set that address as an “Organization-Wide Email Address,” which Salesforce’s Mass Mailer Gateway uses for outbound emails, and finally went through the verification process to confirm ownership of the domain.

Clicking on the verification link to confirm ownership
Clicking on the verification link to confirm ownership (Guardio Labs)

This process allowed them to use their Salesforce email address to send out messages to anyone, bypassing both Salesforce’s verification protections and any other email filters and anti-phishing systems in place.

Indeed, this is what Guardio Labs observed in the wild, with phishing emails that supposedly came from “Meta Platforms” using the “case.salesforce.com” domain.

Phishing email sampled from a real attack
Phishing email sampled from a real attack (Guardio Labs)

Clicking on the embedded button takes the victim to a phishing page hosted and displayed as part of the Facebook gaming platform (“apps.facebook.com”), which adds further legitimacy to the attack and makes it even harder for the email recipients to realize the fraud.

Phishing page hosted on the Facebook gaming platform
Phishing page hosted on the Facebook gaming platform (Guardio Labs)

The goal of the phishing kit employed in this campaign is to steal Facebook account credentials, even featuring two-factor authentication bypassing mechanisms.

The observed attack chain
The observed attack chain (Guardio Labs)

Meta still investigating

After confirming the issues by replicating the creation of a Salesforce-branded address capable of disseminating phishing emails, Guardio Labs notified the vendor of their discovery on June 28, 2023

Salesforce reproduced the vulnerability and resolved the problem exactly a month later, on July 28, 2023.

Regarding the abuse of “apps.facebook.com,” Guardio Labs notes that it should be impossible for the attackers to create the game canvass used as a landing page since Facebook retired this platform in July 2020.

However, legacy accounts that used the platform before its deprecation still have access, and threat actors might be paying a premium for those accounts on the dark web.

Meta removed the violating pages upon Guardio Labs’ report; however, its engineers are still investigating why existing protections failed to stop the attacks.

As phishing actors continue to explore every potential abuse opportunity on legitimate service providers, novel security gaps constantly threaten to expose users to severe risks.

Thus, it is essential not to rely solely on email protection solutions, and also scrutinize every email that lands on your inbox, look for inconsistencies, and double-check all claims made in those messages.

 

(c) Lawrence Abrams

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
2:38 pm, Mai 18, 2025
Wetter-Symbol 17°C
L: 15° | H: 18°
wenige Wolken
Luftfeuchtigkeit: 56 %
Druck: 1019 mb
Wind: 2 mph NNE
Windböe: 10 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 13%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 5:04 am
Sonnenuntergang: 8:49 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
15° | 18°°C 0 mm 0% 7 mph 63 % 1020 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
11° | 18°°C 0 mm 0% 11 mph 82 % 1022 mb 0 mm/h
Di. Mai 20 10:00 pm
Wetter-Symbol
9° | 20°°C 0 mm 0% 8 mph 79 % 1022 mb 0 mm/h
Mi. Mai 21 10:00 pm
Wetter-Symbol
12° | 18°°C 1 mm 100% 9 mph 93 % 1019 mb 0 mm/h
Do. Mai 22 10:00 pm
Wetter-Symbol
9° | 17°°C 0 mm 0% 10 mph 63 % 1023 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
16° | 17°°C 0 mm 0% 7 mph 56 % 1019 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
16° | 17°°C 0 mm 0% 6 mph 54 % 1019 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
13° | 14°°C 0 mm 0% 6 mph 63 % 1020 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
12° | 12°°C 0 mm 0% 7 mph 69 % 1020 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
11° | 11°°C 0 mm 0% 6 mph 82 % 1020 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
12° | 12°°C 0 mm 0% 7 mph 73 % 1021 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
16° | 16°°C 0 mm 0% 8 mph 51 % 1021 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
18° | 18°°C 0 mm 0% 10 mph 45 % 1021 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€93,099.20
0.93%
Ethereum(ETH)
€2,248.26
1.69%
Fesseln(USDT)
€0.90
0.00%
XRP(XRP)
€2.14
2.39%
Solana(SOL)
€153.68
2.76%
USDC(USDC)
€0.90
0.00%
Dogecoin(DOGE)
€0.200758
4.51%
Shiba Inu(SHIB)
€0.000013
4.19%
Pepe(PEPE)
€0.000012
8.05%
Peanut das Eichhörnchen(PNUT)
€0.306420
15.37%
Nach oben scrollen