The flaw enables credential theft and malware distribution at scale, pressuring TikTok to patch quickly and highlighting the need for heightened user vigilance against deceptive email attachments.
The video exposes an open‑redirect vulnerability on TikTok’s domain that has been known internally for more than a year yet remains unpatched. Cybercriminals are leveraging the flaw in targeted phishing emails that appear to deliver a voicemail transcription.
The malicious payload arrives as an HTML attachment named “play_ow” which contains a script that redirects the browser from the legitimate tik‑tok.com URL to an attacker‑controlled Amazon S3 bucket. The redirect URL is heavily URL‑encoded, allowing any destination—such as facebook.com—to be injected.
The presenter highlights anti‑debugger tricks embedded in the JavaScript, including checks for developer tools, key presses, and user‑agent strings, which abort the attack when a security analyst inspects the page. A screenshot shows a fake Cloudflare turnstile and a subsequent Outlook‑style login prompt designed to harvest MFA credentials.
If exploited, the chain can capture login details, install malware, and bypass multi‑factor authentication, posing a significant risk to TikTok’s massive user base. The continued exposure underscores the urgency for TikTok to implement proper redirect validation and for organizations to educate users about suspicious email attachments.
Comments
Want to join the conversation?
Loading comments...