Researchers at Cofense have identified an ongoing, sophisticated phishing campaign targeting marketing and social media professionals. Threat actors are impersonating world-renowned brands such as Tesla, Google, Ferrari, and Red Bull to lure victims with fake job applications. The campaign's primary objective is not just to steal login credentials but to harvest detailed resumes containing a wealth of Personally Identifiable Information (PII). This information provides attackers with high-quality data for use in future, more targeted social engineering attacks, identity theft, or bypassing knowledge-based authentication.
The campaign, active throughout the third quarter of 2024, leverages the strong brand recognition of major companies to build trust with its targets. The attack begins with a well-crafted phishing email, often using spoofed domains to appear legitimate. Victims who click the link are taken through a multi-stage process designed to mimic a real job application portal. This may include a CAPTCHA challenge to filter out security scanners, followed by a fake login page for a legitimate service like Glassdoor or Facebook. The final step is a form to upload a resume, which is the attackers' main prize.
This is a classic social engineering attack with a focus on intelligence gathering rather than immediate financial gain or system access.
T1566.002 - Spearphishing Link: The initial email containing a link to the fake job portal.T1598.002 - Job Listings: The attackers are exploiting the public nature of job seeking to target a specific professional demographic.T1589.002 - Employee Names: The harvested resumes provide attackers with names, contact details, and work histories, which are valuable for future reconnaissance.T1592.004 - Client-side Code: The phishing pages are carefully crafted with HTML and CSS to impersonate real brands.While this attack may not lead to an immediate network compromise, its long-term impact can be severe. The stolen PII and professional histories can be used to:
| Type | Value | Description |
|---|---|---|
| url_pattern | tesla.careers-portal.com |
Example of a suspicious subdomain designed to look legitimate. Monitor for domains that mimic real brands but use generic TLDs or extra words. |
| email_address | hr@google-jobs.net |
Example of a spoofed sender email address. Train users to inspect the full email address, not just the display name. |
| log_source | Email Gateway Logs |
Analyze for emails with suspicious links, especially those using URL shorteners or multiple redirects. |
URL Analysis (D3-UA) to identify malicious links.The primary mitigation is training users to recognize and report sophisticated phishing attempts and to verify information through trusted channels.
Use email and web filters to block access to known phishing sites and domains that impersonate legitimate brands.
Mapped D3FEND Techniques:
Implement an advanced email security gateway that performs real-time URL analysis and sandboxing. This technique is crucial for defeating the multi-stage nature of this phishing campaign. The system should not just check a URL against a static blocklist, but should actively 'detonate' the link in a safe environment to follow redirects and analyze the final landing page for phishing indicators. Specifically for this campaign, the URL analysis engine should be configured to detect typosquatting and domain impersonation, such as identifying domains that combine a known brand name (e.g., 'google') with generic terms (e.g., '-jobs.net'). This automated analysis at the gateway can block the malicious email before it ever reaches the user's inbox, providing a proactive defense that doesn't rely solely on user awareness.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats