
Let’s take a look at a new campaign recently uncovered by Guardio.
We've recently noticed an uptick in efficient and sophisticated phishing. It targets companies with high-value Facebook Business accounts - advertisers who spend large amounts of money and have built a strong reputation on the platform. The ultimate goal of the attack is to gain control over valuable brand Pages and hijacking of high-value ad accounts and all the funds within them.
The attack utilizes well-crafted emails, content hosted on Dropbox (which is whitelisted on many services), fake CAPTACHAs that fool security tools, and a "browser within browser" UX that creates a second address bar, fooling the user.
In this case, scammers contacted company support teams directly, using real information such as the company’s name and official Facebook page to make their approach look legitimate, even personalized. Their message looked like a “Cease and Desist” notice from a well-known record label, claiming copyright infringement on one of the company’s Facebook ads.
.png)
Now, if you’re a marketing manager, that’s exactly the kind of message that triggers concern and immediate action - exactly what scammers wanted.
The email included a Dropbox link to a “document” supposedly containing details about the infringement. Naturally, the support agent forwards it to the marketing manager, who opens the file to understand what’s going on.
.png)
Inside that document is a link to “evidence”, allegedly a Facebook page showing the problematic post. But this link is truncated (so you can’t see the full URL) and doesn’t actually lead to Facebook at all. Clicking it opens a fake Meta-branded CAPTCHA page, carefully designed to build trust and to bypass automatic phishing detection tools. Once you solve the CAPTCHA, a Facebook login popup window appears within a fake browser window.
Browser within Browser : Fully functional browser window that can move distracts the user from the real address bar
.png)
Full Attack Flow:
That login popup isn’t real. It’s a simulated browser window, part of what’s known as a “Browser-in-the-Browser” (BITB) attack, a technique first detailed by security researcher mr.d0x. This fake popup looks authentic, complete with an address bar and familiar design. But it’s just an illusion sitting on top of the phishing page. You can’t move it outside of the browsers like a real popup, you can’t navigate away. It’s pure visual deception aimed at stealing your credentials.
These scams succeed because they’re psychologically and operationally realistic. They use authentic-looking communication (like legal complaints or brand notices), reach your company through legitimate channels such as support tickets or emails, and use real file-sharing services or forms to add credibility and bypass detection.
That’s why training and awareness are crucial across all departments, not just IT. Everyone should know to pause and question:
Even with training, humans make mistakes, and that’s where Guardio steps in. Guardio’s protection detects and blocks fake pages like this “Meta CAPTCHA” site instantly, stopping the attack before anyone can enter credentials.
In this case, Guardio immediately recognized and blocked the malicious page upon click:
.png)
This is exactly the point where the attack becomes a real scam - and where it must be stopped. So even if your support or legal team didn’t catch the deception in time, Guardio would - protecting your people, your accounts, and your company’s assets.
Scams are evolving fast, blending psychological manipulation with technical trickery. Staying one step ahead means combining awareness with real-time protection for both your personal and business accounts. Guardio keeps you covered from fake login popups to malicious file links, so your team can focus on running your business, not defending it.
Act fast: freeze damage, secure accounts, and enable ongoing monitoring.
Secure connections, contact verification, and online security tools are your allies. Make sure you check all of these to make sure you’re not falling for a fake online shopping site.
You can inspect suspicious emails safely by checking the sender’s address and hovering over links without clicking.
Get more tips from our guide on what to do after clicking a phishing link
Act fast: change your password, enable 2FA, and scan for deeper risks.
Use Guardio’s guide on what to do after a data leak.
Phishing Scams