The pandemic has created new opportunities for social engineering attacks on unsuspecting users. One method of attack has been successful enough to force the FBI to release a warning. Cybercriminals are actively using fake job listings to target applicants who complete job applications containing Personally Identifiable Information (PII). This enables the hackers to steal the identity of the applicant. With remote work becoming more and more prevalent, these types of attacks are likely to get worse.
Wordfence, detailed this attack by hackers in a recent Public Service Announcement (PSA). They outlined how an attacker posted a job ad for a position in a reputable company. As with many pandemic job interviews, this initial hiring interview was conducted remotely. Depending upon the quality of the interviewers, the victim is interviewed once or more before being offered the job.
The “employer” (attacker) then congratulates them and states that they will provide all required furniture and office supplies from a specific and obscure online retailer. A bogus check is sent to the victim which they are told to cash, and they’re asked to immediately buy furniture and computing equipment from the attacker’s preferred online supplier. In the Wordfence case, the new employee spent several thousand US dollars before their check was supposed to clear (but never did).
The victim’s bank must put a hold on the check until the funds are transferred from the hiring company’s bank to the prospective employee (never happens). This scam only works when the victim spends their own money out of pocket, at the preferred online supplier’s website on furniture, computers, or other big-ticket items in a non-refundable way. The victim is out of pocket thousands of dollars. The “furniture and equipment company” is actually the attacker who now has the victim’s money. They immediately close up shop in their online retail store and disappear.
There are other variations on this attack. CyberHoot reported earlier on a similar scam to steal Personally Identifiable Information (PII) from a job seeker. In this spin on job applicant attacks, the scam is based around an employment opportunity at a legitimate company (one that may even have identical job postings) and is used as a vehicle for the attacker to scam the victim’s identity for money.
When looking for jobs, it can be a tough time, and having someone reach out for an interview can be exciting. It’s important to still do your due diligence on the employer who is reaching out to you for an interview, even if it’s from a company you recognize. CyberHoot recommends you take the following steps to avoid becoming a victim of this type of scam:
In addition to these actions, CyberHoot also recommends individuals protect their identities by following this advice:
By implementing these measures you’ll become more aware and more secure. You may not have perfect security but you’ll be doing what you can to reduce the risks you face.
Anytime static data that cannot be recreated is breached there are long-term consequences which is the case with the Equifax breach of Social Security Numbers, birth dates, home addresses, and driving license numbers. Putting a credit freeze on your account will protect you largely from hackers taking credit out in your name, but doesn’t prevent them from submitting fraudulent tax returns in your name. Get your tax documents in order and submit them as early as possible.
Transunion Credit Freeze: https://www.transunion.com/credit-freeze
Equifax Credit Freeze: https://www.equifax.com/personal/credit-report-services/credit-freeze/
Experian Freeze Center: https://www.experian.com/freeze/center.html
Innovis Security Freeze: https://www.innovis.com/personal/securityFreeze
Sources:
Additional Reading:
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.