Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsNew ClickFix Campaign Exploits Fake Verification Pages to Hijack Facebook Sessions
New ClickFix Campaign Exploits Fake Verification Pages to Hijack Facebook Sessions
Cybersecurity

New ClickFix Campaign Exploits Fake Verification Pages to Hijack Facebook Sessions

•January 22, 2026
0
GBHackers On Security
GBHackers On Security•Jan 22, 2026

Companies Mentioned

Meta

Meta

META

GitHub

GitHub

Netlify

Netlify

Vercel

Vercel

Cloudflare

Cloudflare

NET

Why It Matters

Compromised session tokens enable instant Facebook account takeover, threatening high‑value creator and brand pages and amplifying the financial and reputational risk for businesses.

Key Takeaways

  • •Fake verification pages harvest Facebook c_user and xs tokens
  • •Attack uses abuse‑friendly hosts like Netlify, Vercel, GitHub Pages
  • •Exfiltration routed through serverless form backends (Formspark, submit‑form.com)
  • •Targets creators, monetized pages, and businesses seeking verification badges
  • •Real‑time token validation reduces false submissions, increasing success rate

Pulse Analysis

The ClickFix campaign illustrates a shift from traditional credential‑phishing to pure social engineering, exploiting users’ trust in Meta’s verification processes. By masquerading as badge‑granting or policy‑appeal portals, attackers bypass technical vulnerabilities entirely, instead coaxing victims to reveal active session cookies through developer‑tool instructions. This method yields high‑value, replayable tokens that grant immediate access without the need for password resets, making it especially lucrative for threat actors targeting high‑profile creators and monetized Facebook pages.

Technically, the operation leverages a resilient, multi‑layered infrastructure. Phishing fronts are scattered across abuse‑friendly hosting services—Netlify, Vercel, Wasmer, GitHub Pages, Surge, Cloudflare Pages, and Neocities—allowing rapid redeployment when takedowns occur. Collected tokens are decoupled from the visible pages via serverless form backends such as Formspark and submit‑form.com, obscuring the true exfiltration endpoints. Advanced variants incorporate IP profiling and geolocation checks, delivering tailored instructional videos and even direct email exfiltration for non‑proxy users, demonstrating a sophisticated, adaptive threat model.

For defenders, the campaign underscores the need to monitor beyond conventional login‑page phishing. Alerts should trigger on any page requesting c_user or xs values, especially when framed as verification, appeal, or badge confirmation. Threat‑intel teams must track abuse‑friendly host patterns and reusable page titles to pre‑empt infrastructure expansion. Blocking serverless form endpoints and employing real‑time token validation can dramatically reduce successful hijacks, protecting both individual creators and enterprise brand assets from rapid account takeover and subsequent misuse.

New ClickFix Campaign Exploits Fake Verification Pages to Hijack Facebook Sessions

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...