Palo Alto Networks' Unit 42 threat intelligence team has uncovered a targeted phishing campaign that weaponizes the company's own brand to defraud job seekers. The attackers impersonate Palo Alto Networks recruiters and target senior-level professionals, using information scraped from LinkedIn to make their outreach appear legitimate. The scam's crux is a clever social engineering ploy: the fake recruiter informs the candidate that their resume (CV) was rejected by an Applicant Tracking System (ATS) due to a formatting error. They then helpfully refer the victim to a 'CV expert' who charges a fee to 'fix' the non-existent problem, successfully extorting money from the hopeful candidate.
This is a financially motivated phishing campaign that relies almost entirely on social engineering rather than technical exploits. The attackers have identified a point of high emotional investment and urgency—a job application with a prestigious company—and are exploiting it.
The attack flow is as follows:
paloaltonetworks-careers[.]com.While low on technical complexity, the campaign is high in operational planning.
T1566 - Phishing). The personalization, leveraging data from LinkedIn, makes it a form of spear-phishing.T1598 - Phishing for Information), where the attacker creates a fabricated situation to manipulate the victim into taking a specific action (paying the fee).This campaign is effective because it preys on a candidate's anxiety and desire to please a potential employer. The 'problem' (a failed ATS scan) is plausible, and the 'solution' (a paid expert) seems like a reasonable small investment for a big career opportunity.
The primary impact is financial loss for the individual victims, who are defrauded of several hundred dollars. However, there are secondary impacts:
The primary indicator is the use of typosquatted domains.
| Type | Value | Description |
|---|---|---|
| domain | paloaltonetworks-careers[.]com |
Example of a malicious domain used to impersonate the legitimate company. |
For job seekers, detection is about vigilance and verification.
-careers) in the domain name.p=reject policy to prevent attackers from spoofing your exact email domain.D3FEND Reference: While D3FEND is technically focused, the principles of verification apply. D3-MFA - Multi-factor Authentication is an example of a system that forces verification. In this social engineering context, the human must perform their own 'authentication' of the recruiter's identity.
Educate job seekers and employees about common social engineering tactics, including pretexting and the creation of false urgency.
For the impersonated company (Palo Alto Networks), a proactive defense against this phishing scam involves DNS Denylisting. The company's security team should actively monitor for newly registered domains that are typosquats or variations of their brand (e.g., paloaltonetworks-careers[.]com). Once identified, these malicious domains should be fed into internal and commercial threat intelligence feeds. This allows the company's own email security gateway and web proxy to block emails from, and connections to, these domains for their employees. By sharing this intelligence, they can also help protect the wider community. This D3FEND technique disrupts the attacker's infrastructure (T1583.001) and prevents the phishing email from ever reaching its intended target, neutralizing the scam at the earliest possible stage.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats