30,000 Facebook Business Accounts Stolen via Google AppSheet Phishing — "AccountDumpling" Operation Exposed

Vietnamese-linked operation "AccountDumpling" has compromised 30,000 Facebook Business accounts by sending phishing emails from Google's legitimate AppSheet address — bypassing spam filters and running a criminal resale storefront for stolen accounts.

Share
A Facebook icon overlaid by a phishing hook with a Google-addressed email above and a criminal storefront below. White line art on bright cobalt background with red-orange accent dots.

A Vietnamese-linked threat operation dubbed "AccountDumpling" has compromised approximately 30,000 Facebook Business accounts using Google AppSheet as a phishing relay — sending fraudulent emails from a legitimate Google address to bypass spam filters, then reselling stolen accounts through a criminal storefront run by the same group.

SAN FRANCISCO / HO CHI MINH CITY — Guardio security researchers disclosed the AccountDumpling campaign on May 1, 2026, revealing a sophisticated Vietnamese-linked operation that has compromised approximately 30,000 Facebook Business accounts by abusing Google AppSheet as a trusted phishing relay. Phishing emails sent from the legitimate "noreply@appsheet.com" Google address bypass traditional spam filters that would flag messages from unknown domains — giving the campaign an unusually high delivery rate to targeted Facebook Business account owners. The operation is not a simple phishing campaign: it features real-time operator panels, continuous evolution of lure types, and a criminal resale loop in which the same group that steals the accounts also runs an illicit storefront selling access back to the criminal market.


Campaign Profile

Threat Intelligence: AccountDumpling — Vietnamese Facebook Business Account Phishing Campaign
DetailInformation
Campaign NameAccountDumpling — named by Guardio; Vietnamese-linked operation
Confirmed Victims~30,000 Facebook Business accounts compromised
Phishing RelayGoogle AppSheet — emails sent from legitimate noreply@appsheet.com address, bypassing spam filters
Primary TargetsFacebook Business account owners — accounts with ad spend, verified status, and business identity
Lure TypesAccount disablement warnings, copyright complaints, verification reviews, executive recruitment, Facebook login alerts
InfrastructureNetlify-hosted fake Facebook help center pages; real-time operator panels; criminal resale storefront operated by same group
Stolen DataFacebook credentials, session cookies, dates of birth, phone numbers, government ID details collected via fake verification flows
Criminal Resale LoopGroup runs illicit storefront selling compromised accounts — account access, business identity, ad reputation, and account recovery services all sold separately
Prior Similar CampaignKnowBe4 documented a similar AppSheet-based Facebook phishing campaign in May 2025 — this operation is a direct evolution of that playbook

The AppSheet Relay Technique

Traditional phishing detection relies heavily on sender domain reputation — emails from newly registered domains or known malicious addresses are flagged or blocked before reaching inboxes. AccountDumpling bypasses this by abusing Google AppSheet's legitimate email notification infrastructure. AppSheet is Google's no-code application platform, and its notification system sends emails from noreply@appsheet.com — a Google-owned domain with impeccable sender reputation. By creating AppSheet automations that trigger phishing email sends, attackers get their phishing content delivered via Google's own mail servers with Google's own DMARC, DKIM, and SPF records intact. The receiving spam filter sees a legitimate Google business email and passes it through. The phishing content claims to be from Meta Support, warns of imminent account disablement, and directs victims to Netlify-hosted fake Facebook help center pages that collect credentials and additional personal data in staged verification flows. Four distinct attack cluster variations were identified, each with different lure themes but the same underlying infrastructure pattern.

Why Facebook Business Accounts Are the Target

A compromised standard Facebook account has limited criminal value. A compromised Facebook Business account is significantly more valuable: it carries established ad spend history that allows immediate launch of fraudulent advertising campaigns before Meta's fraud detection flags the account, business verification status that bypasses many of Meta's protective restrictions, access to business payment methods, and the advertising infrastructure needed to run further phishing or scam campaigns at scale. The AccountDumpling criminal storefront sells not just account access but also the associated business identity and ad reputation — monetizing every component of the stolen account's value separately. For broader context on the most common cybersecurity threats in 2026. All phishing coverage is tracked on The CyberSignal.

What to do now

Facebook Business account owners should enable login alerts and two-factor authentication using a hardware security key or authenticator app — not SMS. Be highly skeptical of any email claiming to be from Meta Support regardless of the sending address, including emails appearing to come from Google domains. Never click links in account warning emails — navigate directly to business.facebook.com and check the Support Inbox there for any genuine communications from Meta. If you manage Facebook Business accounts on behalf of clients, audit business admin access and remove any unrecognized administrators. Enable Meta's Advanced Security settings and review active sessions for any unrecognized logins.


The CyberSignal Analysis

Signal 01 — Trusted Platform Abuse Has Outpaced Email Security

AccountDumpling's abuse of Google AppSheet reflects the same fundamental problem documented across dozens of phishing campaigns in 2025 and 2026: legitimate cloud platforms — Google, Microsoft, Salesforce, Dropbox, Notion — are being systematically abused as phishing relays precisely because their sending reputation bypasses the email security controls organizations have invested in. The more sophisticated email security becomes at detecting malicious domains, the more valuable legitimate cloud platform abuse becomes. This is an arms race that current email security architectures are structurally losing.

Signal 02 — The Criminal Resale Loop Is the Innovation

Guardio's description of AccountDumpling as "a living operation with real-time operator panels" is the key insight. This is not a theft-and-liquidate operation — it is a vertically integrated criminal business that steals accounts, maintains those accounts, and sells multiple components of their value (access, ad reputation, business identity, recovery services) through its own storefront. The sophistication of the commercial operation around the stolen accounts often exceeds the sophistication of the initial theft. This model maximizes revenue per compromised account and creates ongoing criminal infrastructure that persists well beyond any single campaign.

Signal 03 — Vietnamese Threat Actors Have Industrialized Facebook Business Account Fraud

AccountDumpling is the latest in a documented wave of Vietnamese-linked Facebook Business account fraud campaigns that have been active since at least 2023. The playbook — abuse of trusted platforms, fake Meta support pages, credential and cookie theft, criminal resale infrastructure — has been refined through dozens of iterations. Guardio noted that "the same AI-branded service ads are copied and pasted across multiple forums and Telegram channels" suggesting commoditization of the tooling and methodology across the Vietnamese cybercriminal ecosystem, not just a single group.


Sources

TypeSource
Primary ResearchThe Hacker News: 30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign
ResearchGuardio: AccountDumpling — Inside the Vietnamese Facebook Business Account Operation
ContextBleepingComputer: Vietnamese Hackers Use Google AppSheet to Phish Facebook Business Accounts