A large-scale, multi-lingual phishing campaign is targeting individuals with fake job offers to harvest credentials and other sensitive personal data. Research from Bitdefender shows the campaign is impersonating legitimate employers and recruitment agencies, using enticing lures such as easy jobs, quick interviews, and flexible work arrangements. The attacks are geographically targeted, with custom messages in English, Spanish, Italian, and French being sent to victims primarily in the U.S., U.K., France, Italy, and Spain. The goal of the campaign is to trick hopeful job seekers into clicking a malicious link and entering their credentials on a fraudulent website, highlighting the continued effectiveness of social engineering attacks that exploit economic conditions and human emotion.
This is a classic, high-volume credential phishing campaign with a few key characteristics:
The attack chain is straightforward:
The campaign relies almost entirely on social engineering and falls squarely under the MITRE ATT&CK technique T1566.002 - Spearphishing Link. The attackers are also using T1598.003 - Spearphishing via Service by impersonating legitimate companies.
The infrastructure behind the attack likely consists of a network of compromised websites or newly registered domains used to host the phishing pages. The attackers may use URL shorteners or multiple layers of redirection to try and hide the final destination from email security scanners.
Once the credentials are stolen, they can be used for a variety of malicious purposes:
While this attack targets individuals, the impact can extend to their employers.
log_sourceEmail Gateway Logsurl_pattern(URL shorteners)otherSender Mismatchstring_patternGeneric SalutationResponse: If a user reports falling for the phish, the immediate response is to assume their credentials are compromised. Force a password reset on their corporate account and any other known accounts that might share the same password. Investigate their account for any suspicious activity, such as unusual logins or email forwarding rules.
The primary defense is to train users to recognize the signs of phishing, such as urgent language, impersonation, and suspicious links.
Enforcing MFA prevents stolen credentials from being used to access corporate accounts.
Use advanced email security solutions to scan and block malicious links within incoming emails.
While user training is the first line of defense, a technical backstop is crucial. User Behavior Analysis (UBA) can help detect when an employee's account is compromised as a result of this phishing campaign. UBA systems baseline normal user activity and can flag deviations. For instance, if an employee whose credentials were stolen suddenly logs in from a new country, or if their account starts accessing unusual files or attempting to create new email forwarding rules, the UBA system can generate a high-risk alert. This allows the security team to investigate and contain a breach even if the initial phishing attempt went unreported. This is particularly important for detecting the downstream impact of the credential theft on the corporate environment.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.