Facebook Phishing Email Campaign: How Attackers Are Weaponizing Meta Business Manager Partner Requests

Augusto Barros
Augusto Barros
May 11, 2026

Phishing campaigns that "live off the land" of trusted SaaS platforms have become one of the most reliable ways for attackers to slip past Secure Email Gateways (SEGs). When a malicious email originates from a domain like business.facebook.com or facebookmail.com, SPF, DKIM, and DMARC all line up cleanly, sender reputation is pristine, and most filters wave it through. Identifying these messages as phishing requires a deeper level of investigation that is often not feasible to perform there.

Across multiple Prophet AI customers, we've been investigating a wave of these alerts tied to a campaign abusing Meta's own Business Manager partner-invitation infrastructure. The emails are genuine Meta notifications, sent from genuine Meta servers, but the partner request was created by an attacker, and the link inside leads to a credential-harvesting page dressed up as the Meta Agency Partner Program.

This is the same playbook as the Zoom TOAD attack we wrote about in January, applied to a different trusted brand, and another great example of why phishing investigations need to look at intent, not just headers.

The Attack: A Real Email From Facebook, A Fake Destination

The mechanics are simple, which is part of what makes them effective:

  • Stand up a lookalike domain. The attacker registers a freshly-created domain that pattern-matches Meta's partner-program language, with names like agency-ad-hub.com, agency-partner-register.com, or marketing-partner-join.com, often with dozens of subdomains spun up in parallel (signup26., member01., linkhub., support03., and so on) to rotate through as individual hosts get burned.
  • Create a Meta Business account and craft a partner request. Inside Business Manager, the attacker initiates a legitimate "partner request" workflow targeting the victim's Facebook business asset. They populate the request with Meta-flavored language ("You've received a Business Manager partner request," "Meta Agency Partner Program," "Your agency has been selected as a qualified candidate…") and embed the lookalike URL.
  • Let Meta send the email. Meta's own infrastructure generates and delivers the notification from noreply@business.facebook.com. SPF, DKIM, and DMARC pass. The sender IP belongs to Meta. The email template is the real one, because it is the real one.
  • Harvest credentials on the lookalike page. When the victim clicks through, they land on a page that mimics the Meta Privacy Centre or Agency Partner Program onboarding flow, complete with a fake ticket ID, "important notes" about verification timelines, and a registration form that captures Meta credentials, page admin contact details, and anything else the attacker wants to ask for.

The clever piece is step three. The attacker never has to spoof Meta. Meta does the sending for them. Every reputation check, every authentication header, every "is this really from Facebook?" heuristic comes back clean, because the email genuinely is from Facebook. The malicious payload is a single off-domain link buried inside an otherwise authentic notification.

{{ebook-cta}}

Is there any vulnerability being exploited in this case? Not the typical "CVE-like" vulnerability, but a process/business one. Meta's processes around Business account creation and partner requests are being exploited to send a malicious link via a trusted source.

For a marketing agency or in-house social team, the request looks normal in context. Partner invitations are a routine part of how Business Manager works. Someone clicks "View request," authenticates on what looks like a Meta page, and the attacker walks away with access to ad accounts, Pages, pixels, and payment methods, sometimes for the victim's organization, sometimes for every client that agency manages. That secondary blast radius is closer in shape to BEC than to traditional credential phishing: one compromised partner approval opens a portfolio.

The Prophet AI Investigation

In one recent case, Proofpoint flagged an inbound email to a customer's user with the subject "You've received a Business Manager partner request," sent from noreply@business.facebook.com (sender IP 66.220.144.144, which is genuinely Meta's). The embedded URL pointed to hxxp://signup26[.]agency-ad-hub[.]com.

A traditional triage process would run into the same wall the gateway did. Sender domain: trusted. Authentication: passing. Subject line: a real Meta notification template. On surface signals alone, there's nothing wrong with this email.

Prophet AI's investigation went a layer deeper:

  • Brand vs. destination mismatch. The email is branded as Meta and rendered through Meta's template, but the only actionable link points to signup26.agency-ad-hub.com, a domain with no ownership, hosting, or DNS relationship to Meta.
  • Threat intelligence pivots. AlphaMountain classified agency-ad-hub.com as malicious. Forcepoint flagged it as newly registered and suspicious. The combination of a brand-new domain plus a Meta-themed subdomain naming pattern (signup26.) matched the infrastructure profile of the broader campaign.
  • Page content analysis. A scrape of the destination URL returned a Meta-branded "Privacy Centre" / "Meta Agency Partner Program" page, including a fabricated ticket ID, urgency language about verification deadlines, and a participation form designed to capture credentials. Nothing about the page was hosted on or affiliated with Meta.
  • Cross-tool correlation. Prophet AI pulled context from multiple internal and web reputation sources to confirm the destination wasn't a known-good Meta property and that no other internal signals contradicted the phishing determination.

Prophet AI ran 133 queries across 10 data sources and reached a verdict in under seven minutes, classifying the email as a phish, surfacing the supporting evidence, and queuing the remediation actions for analyst review. This is the same pattern of investigation depth that catches campaigns the perimeter doesn't.

Why This Matters

The Meta Business Manager variant is a particularly clean case study in why "trusted sender" is no longer a meaningful signal on its own.

Three things make this campaign worth paying attention to:

The infrastructure is real. Unlike most brand impersonation, there is no spoofed domain to detect, no header to validate, no DKIM signature to fail. The email is exactly what it claims to be, and the only malicious component is the destination of one link. Any control that operates on sender identity is going to pass this through.

The blast radius is large. Marketing agencies running Business Manager for dozens of clients are a single point of failure. One account manager approving a fraudulent partner request can expose every client portfolio under that agency. Enterprises with regional Business Manager hierarchies face the same shape of risk. The attacker doesn't need to break into the company's infrastructure, they need one person with the right permissions to click "View request."

Detection has to happen at and after the URL. Because the email itself is structurally legitimate, the only place to catch this campaign is the embedded link. It has to be checked against threat intel that's fresh enough to know about a domain registered days ago. Stale feeds will miss it. So will any analyst process that stops at "the headers check out."

This is exactly the type of investigation that confuses a junior analyst working from a static playbook. The "obvious" indicators all point to safe. The actual signal is a destination domain that doesn't match the brand the email is claiming to be from, registered in the last week, hosting a credential harvester, and it only surfaces if someone (or something) looks past the envelope and reasons about intent.

Stay Vigilant and Evolve Your Phishing Investigations

Attackers are increasingly building campaigns specifically designed to ride on the reputation of platforms users already trust. Zoom OTP emails. PayPal invoices. DocuSign envelopes. Google Calendar invites. And now Meta Business Manager partner requests. The pattern is the same: use the platform's own infrastructure to deliver an email that passes every sender-reputation check, and put the malicious payload somewhere the gateway won't look.

Defending against this class of attack requires investigations that go beyond "did the email authenticate?" and ask "does the content match the sender, does the destination match the brand, and is the infrastructure on the other side of that link something we've ever seen before?" That's a level of reasoning that doesn't fit cleanly into the typical L1 alert triage playbook, and at the volume of reported phishing alerts modern SOCs see, the contributing alert fatigue makes it unrealistic to escalate every one of them to L2.

This is where Prophet AI fits. By running the full phishing investigation, header analysis, link analysis, threat intel pivots, infrastructure reputation, page content review, cross-tool correlation, at machine speed on every reported phishing alert, Prophet AI gives security teams the ability to run deep investigations at the throughput of an automated triage queue. Campaigns like this Meta Business Manager wave get caught on arrival, with the supporting evidence already assembled for the analyst who signs off on remediation.

If you're seeing a spike in Meta-themed phishing reports across your environment, you're not alone. Make sure your investigation process is prepared to keep up with attackers who have been figuring out how to identify and exploit trusted email sources like Zoom and Meta.

Definitive Guide to AI SOC Agents

This guide breaks down how AI SOC agents work and how to build an agile security operation around agentic AI

Download eBook
Download Ebook
Definitive Guide to AI SOC Agents

Frequently Asked Questions

Insights
Exit icon