Phishing campaign using Google AppSheet compromises 30,000 Facebook accounts
An operation linked to Vietnamese actors is using Google AppSheet as a relay to hijack Facebook accounts on a massive scale.

The new threat: AccountDumpling and the abuse of legitimate platforms
Digital security is facing a new challenge following the discovery of a sophisticated phishing campaign dubbed AccountDumpling. Researchers at Guardio have alerted the public to an operation of Vietnamese origin that uses the Google AppSheet platform as a "relay" to distribute malicious emails, successfully compromising approximately 30,000 Facebook accounts.
The use of legitimate no-code development tools allows attackers to evade traditional security filters, as the emails appear to originate from trusted domains. This tactic demonstrates how human vulnerability remains the weakest link, even when attackers employ trusted infrastructure to mask their intentions.
The cybercrime ecosystem and data monetization
This hack is not an isolated incident, but rather part of an industrialized cybercrime chain. Once attackers take control of the accounts, they are not used solely for direct identity theft; instead, they are listed for sale in an illicit storefront managed by the same actors.
"The attackers have turned profile hijacking into an automated business model, where account access is the primary commodity," note Guardio experts.
Although this attack focuses on credential theft, it is essential to remember that the exposure of personal data is often a precursor to more serious attacks, including the deployment of ransomware in corporate environments if the compromised profiles have administrative permissions on business social media networks. As we have seen in other incidents, such as the critical vulnerability in cPanel and the associated hacking risk, the attack surface is constant and multi-vector.
Recommendations for protecting your digital identity
To avoid falling for these types of scams, it is vital to follow these guidelines:
- Two-Factor Authentication (2FA): Always use authenticator apps or physical security keys instead of SMS.
- Verify senders: Do not blindly trust emails, even if they use well-known corporate platforms like
Google AppSheet. - Activity monitoring: Periodically review the devices connected to your Facebook account and close any unknown sessions.
The sophistication of these campaigns underscores the need for a proactive security posture. Technology, while powerful, can be used against us if proper digital hygiene protocols are not maintained.
Sources:
Related articles
17 de mayo de 2026
Vulnerabilitat crítica a NGINX: CVE-2026-42945 sota atac actiu
Una fallada de desbordament de memòria intermèdia a NGINX està sent explotada activament, posant en risc servidors web globals davant de possibles atacs remots.
17 de mayo de 2026
Critical NGINX vulnerability: CVE-2026-42945 under active attack
A buffer overflow flaw in NGINX is being actively exploited, putting global web servers at risk of potential remote attacks.
17 de mayo de 2026
Vulnerabilidad crítica en NGINX: CVE-2026-42945 bajo ataque activo
Una falla de desbordamiento de búfer en NGINX está siendo explotada activamente, poniendo en riesgo servidores web globales ante posibles ataques remotos.
15 de mayo de 2026
Turla evoluciona Kazuar: el perill d'una botnet P2P persistent
El grup estatal Turla ha convertit la seva porta del darrere (backdoor) Kazuar en una sofisticada botnet P2P, elevant el risc de persistència i espionatge en xarxes compromeses.
Loading comments...