EMERGING THREAT: ATTACKERS EXPLOIT META’S THREADS APP BUZZ 

by | Jul 10, 2023

As the buzz around Meta’s new text-based social networking app, Threads, continues to grow, attackers are seizing the opportunity to take advantage of the buzz. In recent weeks, we have observed a surge in the creation of suspicious domains, with over 700 domains related to Threads being registered daily. These domains pose a significant risk as they can be used to deceive users, distribute malware, and lure unsuspecting individuals into downloading untrusted versions of the app. In this research blog, we shed light on this emerging threat and provide examples of suspicious domains to raise awareness and promote vigilance. 

THE RISING THREAT 

Among the newly registered domains, there are several that exhibit suspicious characteristics and potential malicious intent. One such example is “Threadsapk[.]download,” a potential phishing domain created just a few days ago. This domain raises concerns as attackers may use it to trick users into sharing sensitive information or credentials. 

Another concerning domain is “Threadsappz[.]com” which offers an Android version of the app for download. However, users should exercise caution, as this download is not sourced from the official app store or Google Play. Instead, it redirects to an external source, in this case, a Google Drive, where the APK file can be downloaded. Such downloads from untrusted sources can pose significant security risks, including the potential for malware infection.

This is similar to the previous story, but in this instance, the file can be downloaded from MediaFire instead of the app stores.

LIST OF SUSPICIOUS DOMAINS

We have compiled a list of domain lookalikes that were registered just yesterday. These domains mimic the legitimate Threads app or use variations in their names to mislead users. By sharing this list, we aim to create awareness and prevent unsuspecting individuals from falling victim to these deceptive tactics. Please refer to the attached list for further details on these suspicious domains.

threads[.]ovh
whatisthreads[.]com
socialthreads[.]store
threadsapk[.]download
threadsfollower[.]org
threadsmeme[.]com
bestofthreads[.]com
threadsapp[.]dev
metathreads[.]social
threadsexpert[.]com
threads-apk[.]org
metathreads[.]website
threadsapp[.]shop
threadspix[.]com
tthreadsfollowers[.]com
threadsl[.]com
threadsinstagram[.]app

And many more..

STAYING VIGILANT

It is crucial for users to exercise caution and follow best security practices. To protect yourself from potential threats related to the Threads app:

  1. Download from trusted sources: Only download the Threads app from official app stores, such as the Apple App Store or Google Play Store, to ensure you are accessing the genuine version.
  2. Be cautious of suspicious links: Avoid clicking on links shared through unverified sources, emails, or unfamiliar websites, as they may lead to malicious websites or downloads.
  3. Verify domain authenticity: Pay close attention to the domain name of any Threads-related websites you visit. Be wary of domains that have spelling variations or lookalikes designed to deceive users.
  4. Keep software up to date: Regularly update your device’s operating system and apps to ensure you have the latest security patches and protections against known vulnerabilities.

As the popularity of Meta’s Threads app continues to rise, attackers are capitalizing on the excitement to carry out malicious activities. By creating a large number of suspicious domains, they aim to deceive users and distribute malware. It is crucial for users to remain vigilant, download apps only from trusted sources, and be cautious of suspicious links. 

Product

Product Overview

Maximize security posture while ensuring business uptime

Automated Security Controls Assessment

Validate your security control

Integrations

Connect Veriti with your security solutions

Veriti is a triple winner at the Global InfoSec Awards 2025

 

Read More >>

Use Cases

Security Control Hardening

Reduce risk across the network, endpoint and operating system.​​
Assessing Risks Icon

Threat intelligence enforcement

Extend and enforce threat intelligence across all security controls​

Vulnerability Remediation

Safely remediate vulnerabilities in one click

Agentless OS-Level Remediation

Remediate directly at the OS-Level on the endpoint​

Solutions

Veriti Cloud

First cloud native remediation for your workloads​

Safe Remediation

Ensure remediation actions do not give rise to additional exposures

Odin

AI-Powered Contextual Cybersearch

MITRE ATT&CK®

Quickly respond to live threats with safe and precise remediation

Industries

Veriti for Financial Services

Increase business outcomes

Veriti for MSSPs

Efficiently manage multiple clients in a consolidated platform

Veriti for Healthcare

Neutralize security gaps without impacting healthcare operations

Veriti for Manufacturing

Protecting the heart of your production

Resources

See all resources

Blog

Veriti's security blog

Downloads

The latest guides, white papers and infographics

Videos

Watch the latest in exposure assessments

Events

Live event and on-demand webinars

Glossary

Our Comprehensive Definitions Guide

Veriti is the Sole Vendor Recognized in
Gartner 2025 Preemptive Exposure Management

 

Read the Report >>

Our Story

Learn about Veriti

Careers

Work with us

Newsroom

Our latest updates

Contact US

Get in touch

CHANNEL PARTNERS

Become a partner

MSSPs

Reduce operational costs