Phishing Campaign Lures Marketing Professionals with Fake Jobs at Tesla, Google

Cofense Uncovers Phishing Campaign Targeting Marketers with Fake Job Offers from Major Brands

MEDIUM
October 9, 2025
4m read
PhishingData Breach

Related Entities

Organizations

Other

Tesla Google FerrariRed BullGlassdoorFacebook

Full Report

Executive Summary

Researchers at Cofense have identified an ongoing, sophisticated phishing campaign targeting marketing and social media professionals. Threat actors are impersonating world-renowned brands such as Tesla, Google, Ferrari, and Red Bull to lure victims with fake job applications. The campaign's primary objective is not just to steal login credentials but to harvest detailed resumes containing a wealth of Personally Identifiable Information (PII). This information provides attackers with high-quality data for use in future, more targeted social engineering attacks, identity theft, or bypassing knowledge-based authentication.

Threat Overview

The campaign, active throughout the third quarter of 2024, leverages the strong brand recognition of major companies to build trust with its targets. The attack begins with a well-crafted phishing email, often using spoofed domains to appear legitimate. Victims who click the link are taken through a multi-stage process designed to mimic a real job application portal. This may include a CAPTCHA challenge to filter out security scanners, followed by a fake login page for a legitimate service like Glassdoor or Facebook. The final step is a form to upload a resume, which is the attackers' main prize.

Technical Analysis

This is a classic social engineering attack with a focus on intelligence gathering rather than immediate financial gain or system access.

MITRE ATT&CK Techniques

Impact Assessment

While this attack may not lead to an immediate network compromise, its long-term impact can be severe. The stolen PII and professional histories can be used to:

  • Craft highly convincing spearphishing attacks: An attacker with a target's full resume can create an extremely plausible email from a 'former colleague' or 'recruiter.'
  • Bypass security questions: Resumes often contain information like high school, first job, or mother's maiden name, which are common security question answers.
  • Commit identity theft: The data can be used to open fraudulent accounts or take over existing ones.
  • Corporate espionage: Information about a company's marketing team structure and past projects could be valuable to competitors. For the individuals targeted, it represents a significant breach of personal privacy. For their employers, it creates an ongoing risk, as these employees are now more vulnerable to future targeted attacks.

Cyber Observables for Detection

Type Value Description
url_pattern tesla.careers-portal.com Example of a suspicious subdomain designed to look legitimate. Monitor for domains that mimic real brands but use generic TLDs or extra words.
email_address hr@google-jobs.net Example of a spoofed sender email address. Train users to inspect the full email address, not just the display name.
log_source Email Gateway Logs Analyze for emails with suspicious links, especially those using URL shorteners or multiple redirects.

Detection & Response

  1. Email Security Gateway: Use an advanced email security solution that can analyze URLs at time-of-click and detect impersonation tactics. Use D3FEND's URL Analysis (D3-UA) to identify malicious links.
  2. User Training: This is the most critical defense. Train all employees, especially those in public-facing roles like marketing, to be skeptical of unsolicited job offers. Teach them to verify job openings on the company's official career site before clicking any links or providing information.
  3. Reporting Mechanism: Make it easy for employees to report suspicious emails to the security team. This provides valuable, real-time threat intelligence.

Mitigation

  1. Verify, Then Trust: The core mitigation is behavioral. Always manually navigate to a company's official website to verify a job opening instead of clicking a link in an email.
  2. Limit Public Information: Advise employees to be mindful of the amount of personal information they share on professional networking sites like LinkedIn, as this data is often used by attackers for targeting.
  3. Data Minimization on Resumes: When applying for jobs, consider creating tailored resumes that only include information directly relevant to the position, omitting overly personal details.
  4. Credential Management: Never reuse passwords across different sites. If a credential is stolen from a fake portal, the damage is contained if that password is unique.

Timeline of Events

1
October 9, 2025
This article was published

MITRE ATT&CK Mitigations

The primary mitigation is training users to recognize and report sophisticated phishing attempts and to verify information through trusted channels.

Use email and web filters to block access to known phishing sites and domains that impersonate legitimate brands.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

Implement an advanced email security gateway that performs real-time URL analysis and sandboxing. This technique is crucial for defeating the multi-stage nature of this phishing campaign. The system should not just check a URL against a static blocklist, but should actively 'detonate' the link in a safe environment to follow redirects and analyze the final landing page for phishing indicators. Specifically for this campaign, the URL analysis engine should be configured to detect typosquatting and domain impersonation, such as identifying domains that combine a known brand name (e.g., 'google') with generic terms (e.g., '-jobs.net'). This automated analysis at the gateway can block the malicious email before it ever reaches the user's inbox, providing a proactive defense that doesn't rely solely on user awareness.

Sources & References

Phishing Alert: Fake Job Applications Targeting Marketers
Cofense (cofense.com) October 8, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

PhishingSocial EngineeringCredential HarvestingPIICofense

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading