Cybercrime takes advantage of recession with job-themed scams

By Daksh Kapur

The current economic climate globally is grim because of the ongoing recession. In this environment, job-themed scams have become a prime target for cybercriminals looking to exploit vulnerable individuals.

Trellix Advanced Research Center has observed cybercriminals using phishing and malware campaigns to target job seekers in a bid to steal sensitive information. In phishing attacks, job seekers receive emails from fake companies or recruitment agencies, asking them to provide personal information or login credentials. These emails look legitimate, but are designed to steal sensitive information such as passwords or financial information. In malware campaigns, job seekers receive malicious attachments or URLs to websites that infect their devices with malware or download malicious software. The malware can then be used to steal sensitive information or to gain unauthorised access to the job seeker’s device and the information stored on it.

The attackers are also targeting employers by posing as job seekers to exploit them by delivering malware through attachments or URLs that are disguised as resumes or identification documents of the applicant. This type of attack is becoming increasingly common as cybercriminals take advantage of the high volume of job applications that employers receive.

- Advertisement -

The goal of these attacks is to gain unauthorised access to sensitive information, steal personal data, and disrupt the operation of the organisation. In addition to that, we have also observed APT groups leveraging job-themed emails to deliver malware.

Trellix has also observed attacks utilising fake or stolen documents, such as social security numbers and drivers licenses, to make job-themed emails appear more legitimate. By including fake or stolen documents, cybercriminals aim to increase the perceived credibility of the email, making it more likely that the recipient will fall for these job-themed scams. 

Typo Squatting Domains

Typo squatting is a social engineering attack that purposely uses misspelled domains for malicious purposes.

Cybercriminals and even state sponsored groups are creating typo squatting domains of popular job websites to target job seekers. These domains are like the legitimate websites, but with slight variations such as misspelled words or different extensions. The purpose of these domains is to trick job seekers into thinking they are applying for a job through a legitimate website, when in fact they are providing their sensitive information to cybercriminals.

Our researchers have also noticed an increase in registration of new typo-squatted domains for jobs-related domains like LinkedIn, Indeed etc.

The following are some examples of typo-squatting domains observed by Trellix:

  • indeed-id.com
  • indeed-7.com
  • indeed-a.com
  • indeed.ch
  • indedd.com
  • linkhedin.com
  • linkegin.com
  • linkednn.com

Countries targeted by job themed cyberattacks

Malicious emails

Trellix Advanced Research Center researchers found different styles of job-based malicious email campaigns. The emails either come as a notification of a job vacancy or as a job application which would contain a URL or attachment directing the victim to a phishing page or downloading malware to his system.

Malicious emails targeting employers and job seekers
Malicious emails targeting employers and job seekers

Malicious URLs

The following is an example of a malicious web page being utilised to target job seekers. Most of the phishing pages follow the same style in which they were made to resemble a login form to proceed with the job application.

Malicious websites being utilised In job-themed attacks
Malicious websites being utilised In job-themed attacks

Malware

Trellix identified several malware families targeting job seekers and employers. The following are some of the malware families observed by our researchers:

  • Emotet – An advanced Trojan primarily spread via phishing email attachments and links that, once clicked, launches a payload. The malware then attempts to proliferate within a network by brute forcing user credentials.
  • Agent Tesla – A .NET-based Remote Access Trojan (RAT) and data stealer for gaining initial access that is often used for Malware-as-a-Service (MaaS).
  • Cryxos Trojans – Displays fake virus infection and data theft and asks you to call a number for removal which connects you to a scam call center.
  • Nemucod – Downloads and runs additional malicious files onto the system. The downloaded files are typically info-stealers, though in more recent campaigns Nemucod has also been seen delivering ransomware.

Conclusion

It is crucial for both job seekers and employers to be aware of this new threat and take precautions to protect their personal and financial information. The best defense against such phishing attacks is to exercise caution when receiving emails from unfamiliar sources, especially those containing links or attachments. It is also a good idea to keep software and anti-virus protection up to date to guard against malware. Job-seekers should also be aware of social media recruitment scams.

While the job market is tough, falling victim to a phishing or job-themed scams can make an already difficult situation even worse. By being mindful and taking steps to protect yourself, you can stay safe and secure while searching for employment opportunities.

- Advertisement -

The current economic climate globally is grim because of the ongoing recession. In this environment, job-themed scams have become a prime target for cybercriminals looking to exploit vulnerable individuals.

Trellix Advanced Research Center has observed cybercriminals using phishing and malware campaigns to target job seekers in a bid to steal sensitive information. In phishing attacks, job seekers receive emails from fake companies or recruitment agencies, asking them to provide personal information or login credentials. These emails look legitimate, but are designed to steal sensitive information such as passwords or financial information. In malware campaigns, job seekers receive malicious attachments or URLs to websites that infect their devices with malware or download malicious software. The malware can then be used to steal sensitive information or to gain unauthorised access to the job seeker’s device and the information stored on it.

The attackers are also targeting employers by posing as job seekers to exploit them by delivering malware through attachments or URLs that are disguised as resumes or identification documents of the applicant. This type of attack is becoming increasingly common as cybercriminals take advantage of the high volume of job applications that employers receive.

- Advertisement -

The goal of these attacks is to gain unauthorised access to sensitive information, steal personal data, and disrupt the operation of the organisation. In addition to that, we have also observed APT groups leveraging job-themed emails to deliver malware.

Trellix has also observed attacks utilising fake or stolen documents, such as social security numbers and drivers licenses, to make job-themed emails appear more legitimate. By including fake or stolen documents, cybercriminals aim to increase the perceived credibility of the email, making it more likely that the recipient will fall for these job-themed scams. 

Typo Squatting Domains

Typo squatting is a social engineering attack that purposely uses misspelled domains for malicious purposes.

Cybercriminals and even state sponsored groups are creating typo squatting domains of popular job websites to target job seekers. These domains are like the legitimate websites, but with slight variations such as misspelled words or different extensions. The purpose of these domains is to trick job seekers into thinking they are applying for a job through a legitimate website, when in fact they are providing their sensitive information to cybercriminals.

Our researchers have also noticed an increase in registration of new typo-squatted domains for jobs-related domains like LinkedIn, Indeed etc.

The following are some examples of typo-squatting domains observed by Trellix:

  • indeed-id.com
  • indeed-7.com
  • indeed-a.com
  • indeed.ch
  • indedd.com
  • linkhedin.com
  • linkegin.com
  • linkednn.com

Countries targeted by job themed cyberattacks

Malicious emails

Trellix Advanced Research Center researchers found different styles of job-based malicious email campaigns. The emails either come as a notification of a job vacancy or as a job application which would contain a URL or attachment directing the victim to a phishing page or downloading malware to his system.

Malicious emails targeting employers and job seekers
Malicious emails targeting employers and job seekers

Malicious URLs

The following is an example of a malicious web page being utilised to target job seekers. Most of the phishing pages follow the same style in which they were made to resemble a login form to proceed with the job application.

Malicious websites being utilised In job-themed attacks
Malicious websites being utilised In job-themed attacks

Malware

Trellix identified several malware families targeting job seekers and employers. The following are some of the malware families observed by our researchers:

  • Emotet – An advanced Trojan primarily spread via phishing email attachments and links that, once clicked, launches a payload. The malware then attempts to proliferate within a network by brute forcing user credentials.
  • Agent Tesla – A .NET-based Remote Access Trojan (RAT) and data stealer for gaining initial access that is often used for Malware-as-a-Service (MaaS).
  • Cryxos Trojans – Displays fake virus infection and data theft and asks you to call a number for removal which connects you to a scam call center.
  • Nemucod – Downloads and runs additional malicious files onto the system. The downloaded files are typically info-stealers, though in more recent campaigns Nemucod has also been seen delivering ransomware.

Conclusion

It is crucial for both job seekers and employers to be aware of this new threat and take precautions to protect their personal and financial information. The best defense against such phishing attacks is to exercise caution when receiving emails from unfamiliar sources, especially those containing links or attachments. It is also a good idea to keep software and anti-virus protection up to date to guard against malware. Job-seekers should also be aware of social media recruitment scams.

While the job market is tough, falling victim to a phishing or job-themed scams can make an already difficult situation even worse. By being mindful and taking steps to protect yourself, you can stay safe and secure while searching for employment opportunities.

- Advertisement -

Must Read

Latest Articles