A large-scale, multi-lingual phishing campaign is targeting individuals with fake job offers to harvest credentials and other sensitive personal data. Research from Bitdefender shows the campaign is impersonating legitimate employers and recruitment agencies, using enticing lures such as easy jobs, quick interviews, and flexible work arrangements. The attacks are geographically targeted, with custom messages in English, Spanish, Italian, and French being sent to victims primarily in the U.S., U.K., France, Italy, and Spain. The goal of the campaign is to trick hopeful job seekers into clicking a malicious link and entering their credentials on a fraudulent website, highlighting the continued effectiveness of social engineering attacks that exploit economic conditions and human emotion.
This is a classic, high-volume credential phishing campaign with a few key characteristics:
The attack chain is straightforward:
The campaign relies almost entirely on social engineering and falls squarely under the MITRE ATT&CK technique T1566.002 - Spearphishing Link. The attackers are also using T1598.003 - Spearphishing via Service by impersonating legitimate companies.
The infrastructure behind the attack likely consists of a network of compromised websites or newly registered domains used to host the phishing pages. The attackers may use URL shorteners or multiple layers of redirection to try and hide the final destination from email security scanners.
Once the credentials are stolen, they can be used for a variety of malicious purposes:
While this attack targets individuals, the impact can extend to their employers.
| Type | Value | Description |
|---|---|---|
log_source |
Email Gateway Logs |
Hunt for emails with subjects like 'Job Offer', 'Interview Invitation', or 'Urgent Opening' from external, untrusted senders. |
url_pattern |
(URL shorteners) |
Be wary of emails that use URL shorteners (like bit.ly, tinyurl) in the body, as these are often used to obfuscate malicious links. |
other |
Sender Mismatch |
Check email headers to ensure the 'From' address domain matches the 'Return-Path' domain. Mismatches are a red flag. |
string_pattern |
Generic Salutation |
Phishing emails often use generic greetings like 'Dear Applicant' or 'Dear User' instead of the recipient's name. |
Response: If a user reports falling for the phish, the immediate response is to assume their credentials are compromised. Force a password reset on their corporate account and any other known accounts that might share the same password. Investigate their account for any suspicious activity, such as unusual logins or email forwarding rules.
The primary defense is to train users to recognize the signs of phishing, such as urgent language, impersonation, and suspicious links.
Enforcing MFA prevents stolen credentials from being used to access corporate accounts.
Use advanced email security solutions to scan and block malicious links within incoming emails.
While user training is the first line of defense, a technical backstop is crucial. User Behavior Analysis (UBA) can help detect when an employee's account is compromised as a result of this phishing campaign. UBA systems baseline normal user activity and can flag deviations. For instance, if an employee whose credentials were stolen suddenly logs in from a new country, or if their account starts accessing unusual files or attempting to create new email forwarding rules, the UBA system can generate a high-risk alert. This allows the security team to investigate and contain a breach even if the initial phishing attempt went unreported. This is particularly important for detecting the downstream impact of the credential theft on the corporate environment.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats