Fake ChatGPT Android test invites are stealing Facebook logins through Google’s Firebase service


Android users are getting fake beta invitations for ChatGPT and Meta advertising apps, and some of those invites lead to malicious APKs that steal Facebook credentials. The campaign abuses Firebase App Distribution, a real Google service that developers use to send pre-release builds to testers, which gives the emails and download flow a layer of legitimacy.

The result is a phishing operation that looks more convincing than a normal fake app scam. Instead of sending victims to a random download page, the attackers use Firebase’s testing workflow, where invited users can receive build notifications and install Android APKs outside Google Play. Google’s own documentation confirms that Firebase App Distribution lets developers upload APKs and email testers directly.

According to SpiderLabs, the Android campaign uses invitations for fake ChatGPT and Meta ad-related apps and pushes victims toward malware delivered through Firebase App Distribution. Reporting on the campaign says the malicious apps use names such as com.OpenAIGPTAds, com.opengpt.ads, and com.meta.adsmanager, then present a Facebook login screen to capture credentials for account takeover.

Why this campaign works so well

The main trick is trust. Firebase App Distribution is a legitimate Google product for app testing, and Google’s documentation says testers receive invitation emails and can install pre-release Android builds from that workflow. That means a victim may see a genuine Google-related sender flow and a real Firebase landing page, even though the app behind it is malicious.

That also helps attackers avoid one of the biggest warning signs in mobile phishing. Many users know to distrust sketchy download sites. Fewer people expect abuse inside a real app testing system. If the victim already works with beta apps, the invitation can look routine.

The operation also follows a pattern security teams have watched for months. SpiderLabs said this Android wave came after a related iOS campaign that used fake AI-branded apps. The broader goal appears to stay the same across both platforms: steal Facebook credentials, grab access to business assets, and abuse trusted brands to improve click-through and install rates.

How the attack unfolds

Victims receive an invitation email that looks like a normal testing request.

They click through to a Firebase-hosted testing page.

They install an Android APK outside the Play Store.

The app opens what looks like a Facebook login page.

The victim enters credentials, and the attacker captures them.

In reported cases, the fake apps posed as ChatGPT or Meta ad-related tools rather than delivering any real AI or marketing features.

What makes Firebase part of the story

This incident does not mean Firebase itself is malware. It means attackers appear to be abusing a legitimate distribution channel the way criminals abuse cloud storage, trusted email platforms, and ad networks.

Google describes Firebase App Distribution as a way to distribute pre-release apps to trusted testers, either individually or through groups. Developers can upload APKs, invite testers by email, and make builds available for installation before public release. That design is useful for software teams, but it also creates room for social engineering if an attacker controls the project and the invite list.

Reported indicators tied to the campaign

Reporting on the campaign linked it to several suspicious domains and app identifiers. These reported indicators include the following:

TypeReported indicators
Package namescom.OpenAIGPTAds, com.opengpt.ads, com.meta.adsmanager
Domainsthcsmyxa-nd[.]com, moitasec[.]com, tourmini[.]site, ocngongiare[.]com, disanviet[.]homes, itrekker[.]space

These details come from reporting that cited SpiderLabs’ findings. I could confirm SpiderLabs’ public warning about the Android Firebase campaign, but I could not independently verify every domain from a primary public LevelBlue research page that was accessible through web search.

Firebase test invitations (Source – SpiderLabs)

What Android users should do now

Anyone who receives an unexpected app-testing invite for ChatGPT, Meta Ads, or similar tools should stop and verify it through a separate channel.

Security teams and users should take these steps:

  • Avoid installing APKs from unsolicited testing invites
  • Download ChatGPT and Meta apps only from official stores or verified enterprise channels
  • Treat Firebase-based beta invites with caution if you did not expect them
  • Never enter Facebook credentials into a newly installed test app
  • Turn on two-factor authentication for Facebook and Meta business accounts
  • Review recent logins and ad account activity for anything unusual
  • Block reported malicious domains and investigate devices that installed unknown APKs

These steps line up with the campaign’s reported goal of stealing Facebook credentials and hijacking business or advertising accounts.

Why this matters beyond one fake ChatGPT lure

This campaign shows how attackers keep moving closer to legitimate software delivery channels. Old phishing kits relied on fake sender names and crude landing pages. Newer operations abuse real infrastructure, real brands, and real user habits.

For defenders, that means the old advice still matters, but it no longer covers enough ground on its own. A message can come through a real service and still lead to malware. A testing flow can look authentic and still end in credential theft. In mobile security, trusted delivery has become part of the attack surface.

FAQ

Are these fake ChatGPT invites coming from a real Google service?

The campaign reportedly uses Firebase App Distribution, which is a real Google service for sending pre-release app builds to testers. That is what makes the invitation flow look more legitimate.

Does this mean ChatGPT’s Android app is compromised?

No evidence in the sources I reviewed shows that OpenAI’s official Android app was compromised. The campaign uses fake ChatGPT branding to trick users into installing malicious APKs.

What do the malicious apps try to steal?

The reported goal is Facebook credential theft and account takeover, especially for users tied to business and advertising accounts.

Why not just use Google Play?

Firebase App Distribution is meant for pre-release testing and allows APK distribution outside the Play Store review path. Google documents that developers can upload APKs and invite testers directly.

What is the safest response if you got one of these invites?

Do not install the APK. Verify the sender through a separate trusted channel, and change your Facebook password immediately if you already entered it into one of these apps.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages