Bware the Facebook “Your Page Accessibility Is Limited” Scam

Facebook page administrators beware – there is an insidious new phishing scam making the rounds targeting admins of Facebook pages. Scammers are sending convincing but fake warning messages claiming your page has been restricted for violating Facebook’s policies. The messages urge you to appeal the restriction through a provided link which leads to a sophisticated phishing site designed to steal your Facebook login credentials.

This scam has already claimed many unsuspecting victims who have had their pages hijacked as a result. If you are a Facebook page admin, it is crucial that you educate yourself about this scam so you don’t fall prey to it.

This comprehensive guide will provide an in-depth look at how the Facebook “Your Page Accessibility Is Limited” phishing scam operates, how to identify fraudulent messages, what to do if you clicked the link, and steps to secure your Facebook page going forward.

Meta Protect Facebook Scam

Overview of the Scam

The Facebook page restriction phishing scam is a sophisticated new tactic being used to target owners and administrators of Facebook pages. Scammers are sending fake notification messages stating that the recipient’s page has been restricted or disabled for violating Facebook’s policies.

The messages go on to provide a link to appeal the restriction. However, this link sends victims to a convincing phishing site designed to steal Facebook login credentials in order to hijack the victim’s page.

This scam works by taking advantage of a page admin’s worst fear – having their page unexpectedly restricted or deleted without warning. The threatening language pressures admins to act quickly to recover their page before it is permanently disabled. This sense of urgency pushes victims into clicking the provided link without proper vetting, leading them right into the scammer’s trap.

Once lured onto the phishing site, victims are prompted to enter their Facebook login email and password. These credentials are stolen and soon after used by the scammers to gain full access to both the admin’s personal Facebook account as well as their managed pages.

With an hacked page in hand, scammers can post any content they please. Oftentimes, they use the page to perpetuate the scam by sending the same fake restriction messages to the page’s followers. This allows the scam to spread exponentially.

Some warning signs a page restriction notification is an phishing attempt:

  • The message uses intimidating language about immediate permanent deletion of the page. Real Facebook notifications are calm in tone.
  • Links lead to odd third-party domains instead of facebook.com links.
  • Message requests personal info like password resets. Facebook would never request passwords.
  • No notification of any violation within the actual Facebook platform itself.
  • Sent from an unknown source like text message or email address. Facebook uses official channels.

By 2023, over 100,000 Facebook pages had already been compromised by variants of this scam. Government, business, community organization and personal pages have all fallen victim. High-follower pages are prime targets.

Once scammers control a page, severe damage can be done through spreading misinformation, spam ads, malware and additional phishing attempts to the page’s followers. Compromised pages also suffer reputational damage and loss of followers’ trust.

Recovering hijacked pages can be extremely difficult, especially if the scammers change credentials. Many victims end up having to delete their page entirely and start fresh. Prevention is crucial.

All Facebook page owners should educate themselves on how this scam works so they can avoid falling for fake page restriction messages. Do not click questionable links, provide info to unverified sources or input your Facebook login credentials after following links in messages. Apply increased security settings to safeguard your page.

How the Scam Works

To help you identify and avoid this scam, let’s break down exactly how the Facebook page restriction phishing scam operates:

1. Scammers Send Fake Warning Messages

The first step involves scammers identifying potential target Facebook pages and collecting contact info for their administrators. Pages with large followings are ideal targets.

Scammers then send messages through Facebook Messenger, email, SMS text, or other platforms warning that the recipient’s page has been restricted for violating Facebook’s terms.

Again, these messages appear quite official, using language like:

“Your Facebook page [Page Name] has been restricted due to multiple Community Standards violations. You must submit an appeal within 24 hours through this link or your page will be disabled: [Malicious Link]”

The messages instill fear that admins will permanently lose access to their page if they do not act quickly. This pressures recipients to click the provided “appeal” link without proper scrutiny.

2. The Link Goes To A Phishing Site

While made to look official, the link in the message does not lead to Facebook but rather a phishing site that mimics Facebook’s login page and support site.

These phishing pages are sophisticated, incorporating Facebook branding and imagery to appear legitimate. For example, the login page will look identical to the real Facebook login.

The rest of the phishing site pretends to be Facebook’s Support dashboard. There will be text about restricted page appeals and fields for users to enter info like their page name, email address, etc.

3. Admins Are Prompted To Enter Login Credentials

After clicking the link in the warning message, page admins will first be brought to the fake Facebook login page. The phishing site will prompt them to enter their account email and password to “verify their identity.”

Since the page looks real, many will enter their actual Facebook credentials at this step, especially if they are rushed and worried about their page being restricted.

4. The Phishing Site Collects The Victim’s Data

Once admins enter their email and password, that sensitive login information is harvested by the scammers behind the phishing site. Their credentials are now compromised.

The phishing site may also have additional forms prompting for other personal data like their name, phone number, page name, etc. Any details entered will be collected by the scammers.

5. Scammers Gain Access And Control Of The Page

With the victim’s Facebook login credentials, the scammers can now access and take control of their Facebook account and pages.

They can post scam messages and links through the page to its followers. This allows them to rapidly spread the scam and phishing site to more potential victims.

The scammers may also restrict the original admin’s access to their own page. Or they may keep the admin’s access intact to avoid detection while they use the page illicitly behind the scenes.

Identifying Fake Warning Messages

The Facebook page restriction scam can be convincing. But there are several indicators to help you determine whether a warning message is fake or legitimate:

  • Generic greeting – Real messages from Facebook contain your name or page’s name. Fake messages use generic greetings like “Dear user” or “Hi there.”
  • Spelling and grammatical mistakes – Phishing messages often contain typos, bad grammar or awkward phrasing.
  • Urgent call to action – Scam messages use urgency and threats of account deletion to pressure you. Facebook’s real messages are calm.
  • Unusual sender – Messages can come from unfamiliar email addresses, phone numbers, Messenger accounts, etc. Verify the sender.
  • Suspicious link – Hovers your mouse over the link without clicking to see the actual URL. It should go to facebook.com not an unrelated or odd domain.
  • No notification within Facebook – There will be no notification of any restriction within your actual Facebook account or page.
  • No official communication – Facebook communicates restrictions through their Help Center, emails, page notifications, etc. Not random texts or messages.

When in doubt, log directly into your Facebook account through the secure Facebook website (not via any emailed link) to check for notifications. Contact Facebook support if you suspect a scam message but aren’t sure.

What To Do If You Clicked The Link

If you received a fake warning message about your page being restricted and clicked the phishing link, don’t panic. Here are the steps you should immediately take:

1. Change Your Facebook Password

If you entered your Facebook login credentials, immediately change your password. Do this through the official Facebook website while logged into your account. This prevents the scammers from accessing your account with the compromised password.

2. Enable Two-Factor Authentication

Enable two-factor authentication for your Facebook account. This adds an extra layer of security, requiring a special code from your phone anytime someone tries logging in from an unrecognized device.

3. Check Connected Apps And Third Parties

Review the list of apps and services connected to your Facebook account. Remove anything suspicious that may have been added by scammers with access to your account.

4. Scan Your Computer For Malware

The phishing link may have downloaded malware onto your computer. Scan your full system using security software to check for and remove anything suspicious.

5. Monitor Your Page And Account Activity

Closely monitor your page and Facebook account for suspicious posts, messages or changes over the next few weeks. Watch for scam messages sent to your followers through your page.

6. Report The Phishing Link

Alert Facebook by reporting the phishing link, suspicious third-party apps connected to your account, or messaging scams sent through your page.

7. Contact Your Followers

If scammers used your page to spread scam links or messages, send a post apologizing and warning all your followers. Urge them not to click and to secure their own accounts.

Taking these steps quickly can help secure your account and prevent the scam from spreading further through your page.

Securing Your Facebook Page Going Forward

Here are some tips to lock down your Facebook page’s security going forward:

  • Use a strong password – Don’t reuse passwords. Make your Facebook password long, complex and unique.
  • Turn on login notifications – Get alerts whenever someone logs into your Facebook account from a new device.
  • Limit admin access – Only let essential trustworthy admins control your page. Don’t add temporary admins.
  • Vet messages thoroughly – Double check any alleged warnings about your page before acting.
  • Use security keys – Consider adding physical security keys as an option for accessing your Facebook account.
  • Monitor page activity – Routinely check your page’s posts, messages, connected apps, etc.
  • Educate admins – Ensure all your page’s admins know about the latest Facebook scams and phishing tactics.

Staying vigilant is crucial. Scammers are developing increasingly sophisticated tactics to fool Facebook page administrators. But armed with the right information, you can avoid falling victim and keep your page secure.

Is Your Device Infected? Check for Malware

If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.  

Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.

Malwarebytes For WindowsMalwarebytes For MacMalwarebytes For Android

Scan your computer with Malwarebytes for Windows to remove malware

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes for Windows

    You can download Malwarebytes by clicking the link below.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Your computer should now be free of trojans, adware, browser hijackers, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Scan your computer with Malwarebytes for Mac to remove malware

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

Your Mac should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Scan your phone with Malwarebytes for Android to remove malware

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


Your phone should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

Frequently Asked Questions

1. What is the Facebook “Your Page Accessibility is Limited” scam?

This is a phishing scam where scammers send fake messages to Facebook page admins stating their page has been restricted or disabled for policy violations. The messages contain a link supposedly to appeal the restriction, but it actually leads to a phishing site designed to steal Facebook login credentials in order to hijack the victim’s page.

2. How does the Facebook page restriction scam work?

Scammers identify potential target pages and collect contact info for their admins. They send fake but convincing notification messages about page restrictions via platforms like email or text. The messages urge admins to appeal quickly through a provided link or else the page will be deleted. The link goes to a phishing site mimicking Facebook’s login and support sites. If admins enter their Facebook login info, the scammers gain access and control of the page.

3. What are some tactics used in the page restriction scam messages?

These fake notification messages use tactics like:

  • Official looking Facebook branding and logos
  • Threatening language about urgent permanent deletion
  • Short 24 hour timeline to trigger urgency
  • Link to a fake support site instead of Facebook.com
  • Request for personal info like passwords

4. What are signs a page restriction message is fake?

Some indicators a notification is a scam include:

  • Generic greeting instead of your name
  • Spelling/grammar errors
  • Sent from an unknown sender
  • Link goes to an odd domain
  • No notification within your actual Facebook account

5. What should I do if I clicked the phishing link?

If you entered your Facebook login information, take these steps immediately:

  • Change your Facebook password
  • Enable two-factor authentication
  • Check for suspicious connected apps
  • Scan devices for malware
  • Monitor your page for unauthorized activity
  • Report phishing link to Facebook

6. How can I better secure my Facebook page?

Ways to secure your page include:

  • Using strong unique passwords
  • Enabling login notifications
  • Limiting page admin access
  • Vetting messages thoroughly
  • Using security keys
  • Monitoring page activity
  • Educating all admins on phishing tactics

7. What happens if scammers take over my Facebook page?

If scammers access your page, they can post damaging content like misinformation, spam ads or malware links. Your page’s reputation will suffer. Recovering a hacked page can be very difficult, sometimes requiring deleting and starting a new page entirely.

8. How can I spot fake messages about my page being disabled?

Closely examine any messages about your page being restricted. Fake messages often have urgent threats about disabling your page, poor grammar, brand logos to appear real, and links to sketchy websites. Verify messages within your Facebook account.

9. Should I click links or provide my password if told my page is restricted?

Never provide your password or click links in unsolicited messages claiming your page is restricted. Always log into Facebook directly through the real website to verify any notification and report suspicious messages.

10. How widespread is the Facebook page restriction scam?

This scam has grown quickly, impacting thousands of pages already. All sizes and types of pages have been targeted. High follower pages are frequent targets. The damage can be severe if scammers access your page.

The Bottom Line

The “Your Page Accessibility is Limited” phishing scam targeting Facebook page admins presents a dangerous new threat. Highly-convincing fake restriction warnings are luring unsuspecting victims to phishing sites, resulting in compromised accounts and hijacked pages.

If you oversee a Facebook page, extreme caution is warranted when receiving messages about restrictions. Always thoroughly vet any unusual warnings and never click questionable links or provide your login information. Should the worst happen, take steps immediately to lock down your account and limit the damage.

Stay vigilant about this scam and educate all of your page’s admins. Applying increased security best practices can help safeguard your page going forward. Don’t let scammers maliciously silence your page and its followers. Awareness of tactics like the page restriction phishing scam is one of the best defenses.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.

Leave a Comment