<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Recruiting — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/recruiting/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 25 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/recruiting/feed.xml" rel="self" type="application/rss+xml"/><item><title>Palo Alto Networks Recruiting Impersonation Phishing Campaign</title><link>https://feed.craftedsignal.io/briefs/2026-03-panw-recruiting-scam/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-panw-recruiting-scam/</guid><description>Since August 2025, threat actors have been impersonating Palo Alto Networks talent acquisition staff in a sophisticated phishing campaign targeting senior professionals, using social engineering tactics to solicit fraudulent resume fees.</description><content:encoded><![CDATA[<p>Since August 2025, a series of phishing campaigns have impersonated Palo Alto Networks talent acquisition staff, targeting senior-level professionals. The attackers leverage scraped LinkedIn data to craft personalized lures, enhancing the credibility of their outreach. This campaign involves social engineering to manufacture a bureaucratic barrier related to the candidate&rsquo;s resume. The attackers falsely claim that the candidate&rsquo;s resume failed to meet the applicant tracking system (ATS) requirements. They then offer to assist the candidate in acquiring a position for a fee, typically ranging from $400 to $800 for services like &ldquo;executive ATS alignment&rdquo; or &ldquo;end-to-end executive rewrite.&rdquo; The goal is to exploit the candidate&rsquo;s professional ambitions by creating a sense of financial urgency and directing them to a third-party &ldquo;expert&rdquo; for paid services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Outreach:</strong> Attackers send personalized emails posing as Palo Alto Networks talent acquisition staff, using flattering language and details from the victim&rsquo;s LinkedIn profile.</li>
<li><strong>Establish Rapport:</strong> The emails use legitimate company logos and signatures to appear authentic and build trust with the targeted professional.</li>
<li><strong>Manufactured Crisis:</strong> Attackers claim the candidate&rsquo;s resume failed to meet ATS requirements, creating a bureaucratic barrier.</li>
<li><strong>Offer of Assistance:</strong> The &ldquo;recruiter&rdquo; offers &ldquo;executive ATS alignment&rdquo; services for a fee, suggesting an urgent need to update the resume.</li>
<li><strong>Hand-off to &ldquo;Expert&rdquo;:</strong> The candidate is directed to a purported expert who provides structured service offers with specific price points (e.g., $400, $600, $800).</li>
<li><strong>Time Pressure:</strong> The &ldquo;recruiter&rdquo; implies that the &ldquo;review panel&rdquo; has already begun, urging the candidate to update their CV within a limited timeframe.</li>
<li><strong>Payment Solicitation:</strong> The &ldquo;expert&rdquo; offers to deliver the CV within hours, fitting the ostensible review window, but only after payment.</li>
<li><strong>Financial Exploitation:</strong> Victims who comply with the demands pay for services that are never delivered, resulting in financial loss and potential identity theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This phishing campaign targets senior-level professionals, aiming to defraud them of hundreds of dollars through fabricated resume services. Multiple incidents have been reported, indicating a widespread effort to exploit individuals seeking job opportunities. If successful, victims lose money and may expose personal information, potentially leading to further identity theft or fraudulent activities. The campaign undermines trust in legitimate recruiting processes and damages the reputation of Palo Alto Networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement email filtering rules to flag messages from the IOC email addresses (paloaltonetworks@gmail[.]com, recruiter.paloalnetworks@gmail[.]com, phillipwalters006@gmail[.]com, posunrayi994@gmail[.]com).</li>
<li>Monitor network traffic and DNS queries for connections to domains resembling &ldquo;paloaltonetworks&rdquo; but with slight variations, as mentioned in the overview, and implement blocking where appropriate.</li>
<li>Educate employees and potential job candidates about this phishing scheme, emphasizing the importance of verifying recruiter identities and avoiding payment requests during the hiring process.</li>
<li>Deploy a Sigma rule to detect emails originating from free email providers (e.g. gmail.com) that claim to be from a specific organization based on email content and sender information (see rule below).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>phishing</category><category>recruiting</category><category>social-engineering</category><category>scam</category></item></channel></rss>