The current economic climate globally is grim because of the ongoing recession. In this environment, job-themed emails have become a prime target for cybercriminals looking to exploit vulnerable individuals.
Trellix Advanced Research Center has observed cybercriminals using phishing and malware campaigns to target job seekers in a bid to steal sensitive information. In phishing attacks, job seekers receive emails from fake companies or recruitment agencies, asking them to provide personal information or login credentials. These emails look legitimate but are designed to steal sensitive information such as passwords or financial information. In malware campaigns, job seekers receive malicious attachments or URLs to websites that infect their devices with malware or download malicious software. The malware can then be used to steal sensitive information or to gain unauthorized access to the job seeker’s device and the information stored on it.
The attackers are also targeting employers by posing as job seekers to exploit them by delivering malware through attachments or URLs that are disguised as resumes or identification documents of the applicant. This type of attack is becoming increasingly common as cybercriminals take advantage of the high volume of job applications that employers receive.
The goal of these attacks is to gain unauthorized access to sensitive information, steal personal data, and disrupt the operation of the organization. In addition to that, we have also observed APT groups leveraging job-themed emails to deliver malware.
Trellix has also observed attacks utilizing fake or stolen documents, such as social security numbers and drivers licenses, to make job-themed emails appear more legitimate. By including fake or stolen documents, cybercriminals aim to increase the perceived credibility of the email, making it more likely that the recipient will fall for the scam.
Typo Squatting Domains
Typo squatting is a social engineering attack that purposely uses misspelled domains for malicious purposes.
Cybercriminals and even state sponsored groups are creating typo squatting domains of popular job websites to target job seekers. These domains are like the legitimate websites, but with slight variations such as misspelled words or different extensions. The purpose of these domains is to trick job seekers into thinking they are applying for a job through a legitimate website, when in fact they are providing their sensitive information to cybercriminals.
Our researchers have also noticed an increase in registration of new typo-squatted domains for jobs-related domains like LinkedIn, Indeed etc.
The following are some examples of typo-squatting domains observed by Trellix:
Our researchers have observed that more than 70% of all job themed cyberattacks were targeted towards the United States. The attacks were also observed in other countries like Japan, Ireland, United Kingdom, Sweden, Peru, India, Philippines, Germany to name a few, even though the percentage of attacks towards other countries were significantly lower than the United States.
Trellix Advanced Research Center researchers found different styles of job-based malicious email campaigns. The emails either come as a notification of a job vacancy or as a job application which would contain a URL or attachment directing the victim to a phishing page or downloading malware to his system.
The following are some of the malicious web pages being utilized to target job seekers. Most of the phishing pages follow the same style in which they were made to resemble a login form to proceed with the job application.
Trellix identified several malware families targeting job seekers and employers. The following are some of the malware families observed by our researchers:
- Emotet – An advanced Trojan primarily spread via phishing email attachments and links that, once clicked, launches a payload. The malware then attempts to proliferate within a network by brute forcing user credentials.
- Agent Tesla – A .NET-based Remote Access Trojan (RAT) and data stealer for gaining initial access that is often used for Malware-as-a-Service (MaaS).
- Cryxos Trojans – Displays fake virus infection and data theft and asks you to call a number for removal which connects you to a scam call center.
- Nemucod – Downloads and runs additional malicious files onto the system. The downloaded files are typically info-stealers, though in more recent campaigns Nemucod has also been seen delivering ransomware.
Trellix Product Protections
Our security product provides comprehensive protection from attacks such as typo squatting domains and malware-laced job application emails. Our multi-layered approach includes checks on the URL, email, network and attachment levels to ensure that any potential threat is detected and prevented from causing harm. Our product continuously monitors and updates its threat intelligence database to stay ahead of new and evolving threats.
The following is some a subset of the Trellix Security detections that have been observed for the ongoing campaigns:
|Trellix Network Security Trellix VX Trellix Cloud MVX Trellix File Protect Trellix Malware Analysis Trellix SmartVision Trellix Email Security Trellix Detection As A Service|| FE_Loader_Win32_Emotet_1|
Trojan.Downloader.Nemucod Suspicious File Document Dropping Executables
Suspicious File Dropped by Non Executable
Suspicious File Dropper Activity
Suspicious Process Powershell Activity
Suspicious Process PowerShell Param
Suspicious Network By Powershell
Suspicious Network Activity
Suspicious JSData CC
Suspicious Dropped Executable
Malicious Dropper Indicator
Malicious Downloader Indicator
|Trellix Endpoint Security (HX)|| EMOTET (FAMILY)|
EMOTET A (FAMILY)
EMOTET B (FAMILY)
EMOTET C (FAMILY)
EMOTET D (FAMILY)
EMOTET E (FAMILY)
AGENT TESLA (FAMILY)
SUSPICIOUS POWERSHELL USAGE (METHODOLOGY)
SUSPICIOUS BINARY EXECUTION VIA MSHTA (METHODOLOGY)
SUSPICIOUS WSCRIPT USAGE A
|Trellix Endpoint Security (ENS)||Emotet-FTC Emotet-FGS Emotet-FCZ PWS-FCJT PWS-FDOK AgentTesla-FDOI AgentTesla-FDNG AgentTesla-FDKH JS/Cryxos.a JS/Cryxos.d JS/Downloader.gen.pj JS/Redirector.ek JS/Nemucod.alo JS/Nemucod.aln JS/Nemucod.alj Nemucod.akw|
It is crucial for both job seekers and employers to be aware of this new threat and take precautions to protect their personal and financial information. The best defense against such phishing attacks is to exercise caution when receiving emails from unfamiliar sources, especially those containing links or attachments. It is also a good idea to keep software and anti-virus protection up to date to guard against malware. While the job market is tough, falling victim to a phishing scam can make an already difficult situation even worse. By being mindful and taking steps to protect yourself, you can stay safe and secure while searching for employment opportunities