• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
celebrity tiktok accounts compromised using zero click attack via dms

Celebrity TikTok Accounts Compromised Using Zero-Click Attack via DMs

You are here: Home / General Cyber Security News / Celebrity TikTok Accounts Compromised Using Zero-Click Attack via DMs
June 5, 2024

Popular video-sharing platform TikTok has acknowledged a security issue that has been exploited by threat actors to take control of high-profile accounts on the platform.

The development was first reported by Semafor and Forbes, which detailed a zero-click account takeover campaign that allows malware propagated via direct messages to compromise brand and celebrity accounts without having to click or interact with it.

It’s currently unclear how many users have been affected, although a TikTok spokesperson said that the company has taken preventive measures to stop the attack and prevent it from happening in the future.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

The company further said that it’s working directly with impacted account holders to restore access and that the attack only managed to compromise a “very small” number of users. It did not provide any specifics about the nature of the attack or the mitigation techniques it had employed.

This is not the first time security issues have been uncovered in the widely-used service. In January 2021, Check Point detailed a flaw in TikTok that could have potentially enabled an attacker to build a database of the app’s users and their associated phone numbers for future malicious activity.

Then in September 2022, Microsoft uncovered a one-click exploit affecting TikTok’s Android app that could let attackers take over accounts when victims clicked on a specially crafted link.

That’s not all. As many as 700,000 TikTok accounts in Turkey were found to have been compromised last year, after reports emerged that the greyrouting of SMS messages through insecure channels enabled adversaries to intercept one-time passwords and gain access to TikTok users’ accounts and inflate likes and followers.

Bad actors have also capitalized on TikTok’s Invisible Challenge to deliver information-stealing malware, highlighting continued efforts on the part of attackers to spread malware through unconventional means.

Cybersecurity

TikTok’s Chinese roots have led to concerns that the app could be used as a conduit to gather sensitive information on American users and push propaganda, eventually leading to the passage of a law that would ban the video app in the country unless it is divested from ByteDance.

Last month, the social media giant filed a lawsuit in the U.S. challenging the act, stating it’s an “extraordinary intrusion on free speech rights” and that the U.S. had put forth only “speculative concerns” to justify the ban.

Other countries like India, Nepal, Senegal, Somalia, and Kyrgyzstan have imposed similar bans on TikTok, with several other countries, including the U.S., the U.K., Canada, Australia, and New Zealand, barring the use of the app on government devices.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «russian power companies, it firms, and govt agencies hit by Russian Power Companies, IT Firms, and Govt Agencies Hit by Decoy Dog Trojan
Next Post: Zyxel Releases Patches for Firmware Vulnerabilities in EoL NAS Models zyxel releases patches for firmware vulnerabilities in eol nas models»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.