{"id":783,"date":"2026-05-01T20:00:58","date_gmt":"2026-05-01T20:00:58","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=783"},"modified":"2026-05-01T20:00:58","modified_gmt":"2026-05-01T20:00:58","slug":"30000-facebook-accounts-hacked-via-google-appsheet-phishing-campaign","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=783","title":{"rendered":"30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">May 01, 2026<\/span><\/span><span class=\"p-tags\">Malware \/ Threat Intelligence<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEilUS_xmTpvaJtwhFTnxsBtKSx2hWroMJKWUCKeB_CNx_9-5T85bdpqGfTZ0__XITi-i6ZnndaiiiFggf3Cgf-35KK-G6sEwvnlqom2DK6U-oH_o9GhEGNyd9kiSti-QC_dpl3v7b7IniC9kAUzV265yVbVsWAnLnH1RfQxrftUHj5MFAm03MOBw3Z6UEVb\/s1700-e365\/phish.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>A newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a \u00abphishing relay\u00bb to distribute phishing emails with an aim to compromise Facebook accounts.<\/p>\n<p>The activity has been codenamed <strong>AccountDumpling<\/strong> by Guardio, with the scheme selling the stolen accounts back through an illicit storefront run by the threat actors. In all, roughly 30,000 Facebook accounts are estimated to have been hacked as part of the campaign.<\/p>\n<p>\u00abWhat we found wasn&#8217;t a single phishing kit,\u00bb security researcher Shaked Chen <a href=\"https:\/\/guard.io\/labs\/accountdumpling---hunting-down-the-google-sent-phishing-wave-compromising-30-000-facebook-accounts\">wrote<\/a> in a report shared with The Hacker News. \u00abIt was a living operation with real-time operator panels, advanced evasion, continuous evolution and a criminal-commercial loop that quietly feeds on the same accounts it helps steal back.\u00bb<\/p>\n<p>The findings are just the latest example of how Vietnamese threat actors continue to embrace various tactics to gain unauthorized access to victims&#8217; Facebook accounts, which are then sold on underground ecosystems for monetary gain.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/threatlabz-vpn-risk-2026-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhnNON5UeWywT7OcPNw7V4L7QNWnCnm7Xl_99Y9ek8dL-gRwx-bWxQM1TKqt8deqqrdpUyKMuuijAWyyPQVB0s0qf8ntQ6ldFAJLru-QUWhddKTopc7SeNbBBnd-TsfFyRPP-AAyDuclLlL6XHK4_LXqDC_7eyaz9pzToYr7U543MhrJ7qcK-89sVWHTQUZ\/s728-e100\/zz-2-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The starting point of the latest attacks is a phishing email targeting Facebook Business account owners, claiming to be from Meta Support and urging them to submit an appeal, or risk getting their account permanently deleted. The emails are sent from a Google AppSheet address (\u00abnoreply@appsheet.com\u00bb), allowing them to bypass spam filters.<\/p>\n<p>This false sense of urgency is used to direct users to a fake web page designed to harvest their credentials. It&#8217;s worth noting that a similar campaign was reported by KnowBe4 in May 2025.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhXlG7ak9Xg9LnGZSFyN7pVQlOnvheYwL-HaPupZ2tf8_2c05HAz5GAy2dqkCt_x8X7ZuR39kc23-A-9QT4cMggVM9iEka1g8WXpZstOvNdukI0RlCU9HD62VO4kMcju6d60jSHKX8f0BvxMaGU8BwUCY_9L7WFfqWbNM1l7cJWiSwjGP101LCKnIBKQPW4\/s1700-e365\/appsheet.png\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhXlG7ak9Xg9LnGZSFyN7pVQlOnvheYwL-HaPupZ2tf8_2c05HAz5GAy2dqkCt_x8X7ZuR39kc23-A-9QT4cMggVM9iEka1g8WXpZstOvNdukI0RlCU9HD62VO4kMcju6d60jSHKX8f0BvxMaGU8BwUCY_9L7WFfqWbNM1l7cJWiSwjGP101LCKnIBKQPW4\/s1700-e365\/appsheet.png\" alt=\"\" border=\"0\" data-original-height=\"1819\" data-original-width=\"2432\"\/><\/a><\/div>\n<p>Over the past few weeks, these campaigns have adopted various kinds of lures designed to induce a \u00abMeta-related panic.\u00bb These range from account disablement and copyright complaints to verification review, executive recruitment, and Facebook login alerts. The four main clusters identified by Guardio are listed below &#8211;<\/p>\n<ul>\n<li>Netlify-hosted Facebook help center pages that enable account takeover attacks, in addition to collecting dates of birth, phone numbers, and government-issued ID photos. The data is ultimately forwarded to an attacker-controlled Telegram channel.<\/li>\n<li>Blue badge evaluation lures that guide victims to Vercel-hosted \u00abSecurity Check\u00bb or \u00abMeta | Privacy Center\u00bb pages that are gated by a bogus CAPTCHA check before directing users to the phishing landing page to collect contact details, business information, credentials (after a forced retry), and two-factor authentication (2FA) codes and exfiltrate them to a Telegram channel.<\/li>\n<li>Google Drive-hosted PDFs masquerading as instructions to complete account verification to direct users to collect passwords, 2FA codes, government ID photos, and browser screenshots through html2canvas. The PDF documents are generated using a free Canva account.<\/li>\n<li>Fake job offers that impersonate companies like WhatsApp, Meta, Adobe, Pinterest, Apple, and Coca-Cola to build rapport with the recipients and ask them to join a call or continue the discussion on attacker-controlled sites.<\/li>\n<\/ul>\n<p>Cumulatively, the Telegram channels associated with the first three clusters have been found to hold about 30,000 victim records, most of whom are located in the U.S., Italy, Canada, the Philippines, India, Spain, Australia, the U.K., Brazil, and Mexico, and have been locked out of their own accounts.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/ai-cant-stop-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjPEV6-530TOlxG6PjrmdlY623wpBwduZ7t1HV6flcmO5R4q4AmfixDUzW0CrhlvMVNWbhvOIso-UDNTka4W_W9Chrdj_dglwBZwi7DuePM2IMIl-hfUYVIqBXgfpr_2619K8Gptb4LzwJ6gUbi7lWl2M8AFQJsHEaw63Q7tZ6708YGruiHrr0Y2W9YYxLQ\/s728-e100\/ThreatLocker-d.png\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>As for who is behind the operation, the smoking gun evidence has come from the PDFs generated as part of the third cluster using the free Canva account, with metadata listing a Vietnamese name \u00abPH\u1ea0M T\u00c0I T\u00c2N\u00bb as the files&#8217; author. Further open-source intelligence has led to the discovery of a website (\u00abphamtaitan[.]vn\u00bb), where they offer digital marketing services.<\/p>\n<p>In a post shared on X in February 2023, the website&#8217;s handle <a href=\"https:\/\/x.com\/phamtaitanvn\/status\/1623563864456720384\">said<\/a> it \u00abspecializes in providing digital marketing services, marketing resources, and consulting on effective digital marketing strategies.\u00bb<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgeR52KyZ-mtBJe1c8lFdjIe3BLKL_BYr42ksQ-hOoHWhDVgbu_MPRnmpSC97YLC702a_LSzKrWd-Q3eLnClm2D4i8GL7g3UI-LTvdxFT5OMNEhH4Mac0G9v07Swjj-W6Wy9QNxE-8wJQa-4gPtSKrvXOkPVCvRGJktP7g43RYOy0Swbfe-GeDe7jT3Bbfv\/s1700-e365\/telegram.png\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgeR52KyZ-mtBJe1c8lFdjIe3BLKL_BYr42ksQ-hOoHWhDVgbu_MPRnmpSC97YLC702a_LSzKrWd-Q3eLnClm2D4i8GL7g3UI-LTvdxFT5OMNEhH4Mac0G9v07Swjj-W6Wy9QNxE-8wJQa-4gPtSKrvXOkPVCvRGJktP7g43RYOy0Swbfe-GeDe7jT3Bbfv\/s1700-e365\/telegram.png\" alt=\"\" border=\"0\" data-original-height=\"1347\" data-original-width=\"2432\"\/><\/a><\/div>\n<p>\u00abTaken together, they form a consistent picture of a large, Vietnamese-based, mega operation,\u00bb Chen said. \u00abThis campaign is bigger than a single AppSheet abuse. It&#8217;s a window into the dark market around stolen Facebook assets, where access, business identity, ad reputation, and even account recovery have all become tradable commodities. Another entry in the pattern we keep surfacing: trusted platforms repurposed as delivery, hosting, and monetization layers.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802May 01, 2026Malware \/ Threat Intelligence A newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a \u00abphishing relay\u00bb to distribute phishing emails with an aim&hellip;<\/p>\n","protected":false},"author":1,"featured_media":784,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[592,1504,6,1188,2,715,390],"class_list":["post-783","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-accounts","tag-appsheet","tag-campaign","tag-facebook","tag-google","tag-hacked","tag-phishing"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=783"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/783\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/784"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}