Recruitment Phishing Scams: Fake Job Offers Spread Malware

Edward Zhou
Edward Zhou

CEO & Founder

 
July 16, 2025 4 min read

Fraud Warning from Red Bull Policy Center

It has come to light that the Red Bull brand is being exploited by third parties for fraudulent activities, especially online and through email. These scams primarily aim to extract money or sensitive personal and financial information from victims, commonly referred to as “phishing”.

Red Bull emphasizes the importance of protecting its trademarks and ensuring that its name, logo, and brand are not misused for fraudulent purposes. The company is actively working to shut down such activities.

Important Red Bull Policies:

  • Red Bull does not send emails from public email accounts like GMX, Hotmail, or Gmail.
  • No prepayments are requested for handling fees related to advertisement campaigns or job offers.
  • Products are not delivered directly after prepayment to an intermediate distributor or escrow account.

Common Fraud Examples:

  1. Promotion Scam: Scammers may inform recipients about an alleged Red Bull promotion campaign, asking for personal data to participate.
  2. Lottery Scam: Victims receive messages claiming they have won money in a lottery organized by Red Bull, which does not organize such lotteries.
  3. Employment Scam: Fraudsters send fake recruitment forms offering non-existent job opportunities using Red Bull’s name.
  4. Car Advertisement Scam: Victims are misled into believing they will be compensated for placing Red Bull ads on their cars.
  5. Export Scam: Fraudsters pose as official distributors offering Red Bull products at below-market prices, demanding advance payments before disappearing.

If you encounter suspicious offers, check the sender’s background and website professionalism. Report any doubts to local authorities.

For reporting fraud, contact Red Bull at [email protected].

Anatomy of a Recruitment Phish

A recent experience reveals a recruitment phishing attempt on LinkedIn. The phisher posed as a recruiter for Ripple, presenting a job description that seemed legitimate.

Upon expressing disinterest due to a lack of required experience, the recruiter insisted that it didn't matter. This raised initial concerns. Subsequently, the recruiter offered a high compensation figure, and asked for an email address, leading to a Slack invitation for further communication.

The conversation progressed to a take-home Python coding test without an initial phone call, which is uncommon in typical hiring processes. This raised additional red flags.

After receiving a suspicious coding test file, the individual discovered malicious code hidden within. The inspection revealed backdoor capabilities, designed to send data to a remote server.

This incident underscores the necessity for vigilance against such scams, especially when recruiters bypass standard processes and use non-professional email addresses.

Fake Recruiters and Banking Trojan

Cybersecurity researchers have identified a mobile phishing campaign distributing an updated version of the Antidot banking trojan. Attackers masquerade as recruiters, enticing victims with fraudulent job offers.

Victims download malicious applications disguised as legitimate apps, which eventually install the banking trojan on their devices. The updated Antidot Banker, labeled AppLite, can siphon unlock PINs and remotely control infected devices.

The phishing strategy often promises lucrative job opportunities, leading victims to download applications from phishing pages. Once installed, these applications facilitate further malicious activity, including stealing credentials and enabling unauthorized access.

Zimperium researchers uncovered a network of fake domains used for distributing malware-laden APK files. The malicious app employs various manipulative tactics, including requesting permissions to overlay device screens and carrying out harmful operations.

Mobile Phishing Campaign

DarkGate Malware via Fake Job Offers

Threat actors are leveraging fake job offers on LinkedIn, particularly for a position at Corsair, to distribute DarkGate malware. This phishing activity was detected by cybersecurity firm WithSecure, linking it to Vietnamese cybercriminal groups.

These campaigns target users in social media management roles, enticing them to download malicious files that eventually lead to malware installation. The downloaded ZIP file contains scripts that facilitate the malware deployment process.

Once installed, DarkGate attempts to uninstall security products and carry out further malicious activities, including stealing sensitive information. LinkedIn has introduced features to combat such abuses, but vigilance remains crucial.

Fake Corsair Job Offer

Recruitment Phishing Scam Imitates Hiring Process

A phishing campaign is utilizing CrowdStrike’s branding to deliver malware disguised as a fake application. This tactic mimics legitimate recruitment processes to deceive potential victims into downloading malicious software.

To protect against these scams, individuals are encouraged to verify the authenticity of job offers and recruiters, ensuring that communications come from official channels and domains.

Organizations should implement robust security measures to detect and mitigate the risks associated with recruitment phishing scams.

Edward Zhou
Edward Zhou

CEO & Founder

 

CEO & Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions..

Related Articles

Ransomware Attacks Target Russian Vodka and Healthcare Sectors

The Novabev Group, parent company of the Beluga vodka brand, experienced a ransomware attack on July 14, 2025, causing significant disruptions. The attack affected WineLab, the company's liquor store chain, leading to a three-day closure of over 2,000 locations in Russia. The company reported that the attack crippled its IT infrastructure, particularly point-of-sale systems and online services. Novabev Group stated, "The company maintains a principled position of rejecting any interaction with cybercriminals and refuses to fulfill their demands."

By Alan V Gutnov July 19, 2025 3 min read
Read full article

Retail Sector Faces Surge in Ransomware Attacks: A 2025 Analysis

Publicly disclosed ransomware attacks on the retail sector globally surged by 58% in Q2 2025 compared to Q1, with UK-based firms being particularly targeted, according to a report by BlackFog. This spike in attacks follows high-profile breaches affecting retailers like Marks & Spencer (M&S), The Co-op, and Harrods, attributed to the threat actor known as Scattered Spider.

By Alan V Gutnov July 19, 2025 2 min read
Read full article

AI-Driven Lcryx Ransomware Emerges in Cryptomining Botnet

A cryptomining botnet active since 2019 has incorporated a likely AI-generated ransomware known as Lcryx into its operations. Recent analysis by the FortiCNAPP team at FortiGuard Labs identified the first documented incident linking H2miner and Lcryx ransomware. This investigation focused on a cluster of virtual private servers (VPS) utilized for mining Monero.

By Edward Zhou July 19, 2025 3 min read
Read full article

Preventing ClickFix Attacks: Safeguarding Against Human Error

ClickFix is an emerging social engineering technique utilized by threat actors to exploit human error. This technique involves misleading users into executing malicious commands under the guise of providing "quick fixes" for common computer issues. Threat actors use familiar platforms and deceptive prompts to encourage victims to paste and run harmful scripts.

By Alan V Gutnov July 19, 2025 3 min read
Read full article