MailGuard has intercepted a new phishing campaign impersonating Meta, targeting Facebook and Instagram page owners with fake compliance notices designed to steal personal details and passwords. The scam uses long, official‑looking emails and a staged verification flow that closely resembles Meta’s real interfaces. This campaign is currently being blocked across MailGuard’s global filter network.
How the scam works
The email claims the recipient’s page is under review for potential policy violations and urges them to review their account to avoid restrictions. The link leads to a multi‑step phishing flow designed to collect personal information and login credentials.
Step 1: Fake Meta compliance email
The email states the account is “under review” and encourages the user to act quickly.

Attackers use this to create urgency and prompt the victim to click the link.
Step 2: Fake review prompt
The link opens a page styled as a Meta Privacy Centre appeal form requesting personal details.

This step is designed to collect identity information before progressing to credential theft.
Step 3: Appeal Form
A fake Facebook appeal form appears, prompting the user to enter their details.

This step is used to harvest account credentials.
Step 4: Password request
The next page requests a password as part of a “security verification” process.

This enables attackers to attempt full account takeover.
Key indicators of the threat
- Display names such as Meta Account Support, Meta Compliance Team and Meta Security Team
- Sender addresses using random mailboxes on an unrelated parked domain
- Simple HTML email containing a single shortened link
- Phishing pages hosted on lookalike domains outside the legitimate Meta ecosystem
- Multi‑step flow capturing personal details, passwords and 2FA codes
- Interfaces closely mimicking Meta’s privacy and login pages
Why this matters for businesses
This campaign is particularly dangerous for organisations that rely on Facebook and Instagram pages for community engagement, marketing and customer communication. A successful compromise can allow attackers to:
- Take over pages and profiles
- Run fraudulent advertisements
- Message followers from trusted accounts
- Lock legitimate owners out of their assets
With many staff managing social media accounts from corporate devices, a single phishing email can quickly escalate into a business‑level security incident.
Stay Safe, Know the Signs
MailGuard advises all recipients of these emails to delete them immediately without clicking on any links. Responding or providing personal details can lead to identity theft, data breaches, and financial losses.
Avoid emails that:
- Aren’t addressed to you personally.
- Are unexpected and urge immediate action.
- Contain poor grammar or misses crucial identifying details.
- Direct you to a suspicious URL that isn’t associated with the genuine company.
Many businesses turn to MailGuard after a near miss or incident. Don't wait until it's too late. Reach out to our team for a confidential discussion by emailing expert@mailguard.com.au or calling 1300 30 44 30.
One Email Is All That It Takes
All that it takes to devastate your business is a cleverly worded email message that can steal sensitive user credentials or disrupt your business operations. If scammers can trick one person in your company into clicking on a malicious link or attachment, they can gain access to your data or inflict damage on your business.
For a few dollars per staff member per month, you can protect your business with MailGuard's specialist AI-powered, zero-day email security. Special Ops for when speed matters! Our real-time zero-day, email threat detection amplifies our client’s intelligence, knowledge, security and defence. Talk to a solution consultant at MailGuard today about securing your company's inboxes.
Stay up-to-date with MailGuard's latest blog posts by subscribing to free updates. Subscribe to weekly updates by clicking on the button below.




