← Back to Crime & Security

New Phishing Campaign Targets TikTok Business Accounts

Crime & SecurityAI-Generated & Algorithmically Scored·

AI-generated from multiple sources. Verify before acting on this reporting.

SEOUL, March 27 (AP) — A new wave of phishing attacks targeting TikTok Business accounts has been detected by cybersecurity researchers, marking a significant escalation in efforts to compromise digital advertising platforms.

The Advanced Intelligence Threat Monitor (AITM) identified the campaign on Thursday, noting that the malicious activity is specifically designed to deceive business users into surrendering login credentials. The attacks utilize sophisticated social engineering tactics, mimicking official TikTok communications to trick recipients into clicking malicious links.

The phishing wave represents a shift in focus toward commercial accounts, which hold greater financial value and access to advertising budgets. Unlike previous campaigns that targeted individual users, this operation appears structured to siphon funds directly from business advertising wallets or to hijack accounts for fraudulent promotional activities.

Cybersecurity experts warn that the sophistication of the emails suggests a well-resourced threat actor. The messages contain urgent language regarding account suspension or billing discrepancies, pressuring recipients to act quickly without verifying the sender's authenticity. Once a user clicks the embedded link, they are directed to a fraudulent login page that captures their username and password.

TikTok has not yet issued a public statement regarding the specific campaign. The company's security team typically responds to such threats by resetting compromised credentials and issuing warnings to affected users. However, no official confirmation of the scale or impact of this specific wave has been released.

The timing of the attack coincides with a period of increased digital advertising spending globally. Analysts suggest that bad actors are capitalizing on the high volume of transactions to maximize potential returns. The lack of specific geographic targeting in the initial reports suggests the campaign may be global in scope, affecting businesses across multiple regions.

Security professionals advise business account holders to exercise extreme caution when receiving unsolicited communications. They recommend verifying the sender's email address, avoiding links in unexpected messages, and enabling multi-factor authentication as an additional layer of security. Users who suspect they have been targeted are urged to change their passwords immediately and report the incident to the platform.

The full extent of the damage remains unclear as the campaign is still in its early stages. Investigators are working to trace the origin of the phishing links and identify the infrastructure used to host the fraudulent sites. Questions remain regarding the number of accounts already compromised and whether any financial losses have occurred.

As the investigation continues, the cybersecurity community is monitoring for similar patterns in other social media platforms. The incident underscores the evolving nature of cyber threats targeting digital commerce and the ongoing challenge of securing business accounts against increasingly sophisticated deception tactics.