Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
May 2, 2026
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
Home/CyberSecurity News/Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
CyberSecurity News

Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook

A sophisticated cybercriminal operation, dubbed “AccountDumpling,” has compromised approximately 30,000 Facebook accounts worldwide. This extensive breach leveraged the abuse of...

Marcus Rodriguez
Marcus Rodriguez
May 2, 2026 3 Min Read
0 0

A sophisticated cybercriminal operation, dubbed “AccountDumpling,” has compromised approximately 30,000 Facebook accounts worldwide. This extensive breach leveraged the abuse of legitimate services, specifically Google AppSheet, Netlify, and Telegram, to facilitate widespread credential theft. Attackers exploited Discovered by Guardio Labs, this Vietnamese-linked campaign abuses Google’s AppSheet platform to bypass traditional email security filters.

By routing fully authenticated phishing lures through legitimate channels, the attackers successfully harvest credentials and identity documents. These stolen Facebook Business accounts are subsequently monetized or resold back to victims through an illicit storefront.

The foundation of this campaign relies on hijacking platform trust rather than spoofing domains. The threat actors use Google AppSheet, a legitimate no-code app-building service, to distribute malicious notifications.

Email phishing (Source: Guard Labs)
Email phishing (Source: Guard Labs)

Because these emails are sent directly from Google servers using the address [email protected], they easily pass SPF, DKIM, and DMARC authentication checks.

Account Dumpling (Source: Guard Labs)
Account Dumpling (Source: Guard Labs)

Security defenders and spam filters consistently wave these messages through since Google genuinely owns the sending infrastructure. This forces victims to rely entirely on identifying the deceptive content within the message itself.

Attack and Evasion Methodologies

The operation is highly modular, employing four distinct phishing clusters to target victims based on different psychological triggers.

Cluster Type Lure Strategy Hosting Platform Technical Features
Policy Violation Fake Facebook Help Center notices threatening permanent account disablement  Netlify  HTTrack cloning artifacts, unique subdomains to evade blocklists, serverless functions for data exfiltration 
Reward Promise Invitations for Blue Badge verification or exclusive advertiser rewards  Vercel  Unicode obfuscation in preheaders, fake reCAPTCHA barriers, live credential validation scripts 
Live Control Urgent Meta notices disguised as a clean, single-image notification  Google Drive (Canva PDFs)  WebSocket-based live phishing panels enabling real-time, human-in-the-loop interaction 
Social Engineering Fake senior job offers from prominent tech companies like Meta and Apple  Off-platform communication channels  Cyrillic homoglyphs in sender display names, pivoting to live conversations to slowly build trust 

Behind the sophisticated front-end lures, the AccountDumpling operation relies entirely on Telegram bots for its command-and-control exfiltration.

Telegram Phishing Campaign(Source: Guard Labs)
Telegram Phishing Campaign(Source: Guard Labs)

Stolen credentials, two-factor authentication codes, dates of birth, and government-issued ID photos are instantly routed to private Telegram channels.

Operators actively monitor these streams to validate the stolen data and execute account takeovers in real time. Telemetry from the recovered bot infrastructure indicates roughly 30,000 victim records have been processed.

Geographic analysis reveals that 68.6 percent of the targeted individuals and businesses are located in the United States.

Canva Generated Phishing (Source: Guard Labs)
Canva Generated Phishing (Source: Guard Labs)

Guardio Labs successfully traced the core of the operation to a Vietnamese threat actor through a critical operational security failure.

Phishing Campaign (Source: guardLabs)
Phishing Campaign (Source: guardLabs)

A Canva-generated PDF used in the third attack cluster retained its author metadata, exposing the real name “PHẠM TÀI TÂN”. Investigators connected this name to a public business persona in Vietnam that actively advertises Facebook account recovery and security services.

This reveals a circular criminal economy in which attackers steal valuable business assets, use them to run fraudulent campaigns, and then attempt to sell recovery services back to the original victims.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackphishingSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
DDoS Attack Hits Ubuntu Website & Canonical Web Services
May 1, 2026
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us