<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Social-Engineering — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/social-engineering/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 08:41:57 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/social-engineering/feed.xml" rel="self" type="application/rss+xml"/><item><title>Malware Distribution via Hugging Face and ClawHub</title><link>https://feed.craftedsignal.io/briefs/2026-05-huggingface-clawhub-malware/</link><pubDate>Fri, 01 May 2026 08:41:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-huggingface-clawhub-malware/</guid><description>Threat actors are using social engineering to distribute malware via AI distribution platforms such as Hugging Face and ClawHub by tricking users into downloading malicious files, which leads to malware infections on Windows, macOS, Linux, and Android systems.</description><content:encoded><![CDATA[<p>Threat actors are leveraging AI distribution platforms like Hugging Face and ClawHub to distribute malware. This involves social engineering tactics to deceive users into downloading files that contain malicious code. Instead of directly compromising AI agents, the attackers abuse user trust by injecting indirect prompts into resources that the AI accesses. Acronis reported that on ClawHub, nearly 600 malicious skills across 13 developer accounts were identified distributing trojans, cryptominers, and information stealers targeting both Windows and macOS. On Hugging Face, attackers created repositories hosting malicious files designed to stage multi-step infection chains leading to infostealers, trojans, malware loaders, and other types of malware targeting Windows, Linux, and Android. This tactic allows attackers to bypass traditional security measures and leverage the platforms&rsquo; reputation for trusted AI tooling.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker creates a malicious repository or skill on Hugging Face or ClawHub.</li>
<li>The repository or skill contains files that appear legitimate but include malicious code.</li>
<li>The attacker uses social engineering to entice users to download the files.</li>
<li>Upon execution, the malicious code fetches additional payloads from external sources.</li>
<li>For macOS, the payload can be Atomic macOS Stealer (AMOS) Stealer.</li>
<li>The downloaded payload executes commands to install hidden dependencies.</li>
<li>The malware establishes persistence on the victim&rsquo;s system.</li>
<li>The malware performs its intended malicious actions, such as stealing information or mining cryptocurrency.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks can lead to the installation of various types of malware, including infostealers, trojans, cryptominers, and malware loaders. The targeted platforms include Windows, macOS, Linux, and Android, potentially impacting a wide range of users and systems. The abuse of trust in AI distribution platforms poses a significant risk, as users may be less likely to scrutinize files from these sources. Acronis identified close to 600 malicious skills on ClawHub alone, indicating the scale of this threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for execution of downloaded files from Hugging Face or ClawHub with unusual parent processes using the &ldquo;Detect Suspicious Process Execution from AI Platforms&rdquo; Sigma rule.</li>
<li>Implement network monitoring to detect connections to known malicious domains or IPs associated with malware distribution campaigns that originate from processes associated with AI platform tooling.</li>
<li>Educate users about the risks of downloading files from untrusted sources, even on trusted platforms like Hugging Face and ClawHub.</li>
<li>Regularly scan systems for known malware signatures and indicators of compromise associated with infostealers and trojans.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>malware</category><category>social-engineering</category><category>ai-platforms</category></item><item><title>ClickFix 'BackgroundFix' Campaign Delivers CastleLoader, NetSupport RAT, and CastleStealer</title><link>https://feed.craftedsignal.io/briefs/2026-04-clickfix-backgroundfix/</link><pubDate>Thu, 30 Apr 2026 13:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-clickfix-backgroundfix/</guid><description>The 'BackgroundFix' ClickFix campaign uses social engineering to trick victims into downloading malware disguised as a free image-editing tool, leading to the deployment of CastleLoader, NetSupport RAT for remote access, and CastleStealer for credential theft.</description><content:encoded><![CDATA[<p>The BackgroundFix campaign is a social engineering scheme using fake &ldquo;remove your photo background&rdquo; services to deliver malware. Victims are lured to malicious sites mimicking legitimate image editing tools. The sites feature fake upload interfaces, progress bars, and download buttons to appear authentic. This campaign delivers a multi-stage payload, starting with CastleLoader. CastleLoader then drops NetSupport RAT, enabling remote access for the attackers, and CastleStealer, a custom .NET stealer designed to exfiltrate browser credentials, wallet extension data, and Telegram session files. This campaign appears to be active, with multiple domains sharing the same template.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Victim searches for an online background removal tool and lands on a malicious BackgroundFix site.</li>
<li>The victim uploads an image to the fake website.</li>
<li>After clicking a checkbox, the site instructs the victim to copy a command to their clipboard.</li>
<li>The copied command executes <code>finger.exe</code> to query <code>cheeshomireciple[.]com</code></li>
<li><code>finger.exe</code> retrieves a batch script from the C2 server.</li>
<li>The batch script executes commands to download and execute further payloads.</li>
<li>CastleLoader is deployed, subsequently dropping NetSupport RAT and CastleStealer.</li>
<li>NetSupport RAT grants the attacker remote access, while CastleStealer exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks result in the installation of NetSupport RAT, granting attackers remote control over the compromised system. Additionally, CastleStealer exfiltrates sensitive information such as browser credentials, wallet extension data, and Telegram session files. This stolen data can be used for further malicious activities, including financial fraud, identity theft, and unauthorized access to sensitive accounts. The active nature of the campaign and the use of multiple domains suggest a broad targeting scope.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for the execution of <code>finger.exe</code> with command-line arguments pointing to external domains (IOC: <code>cheeshomireciple[.]com</code>).</li>
<li>Deploy the Sigma rule to detect the execution of <code>finger.exe</code> to identify potential initial access attempts.</li>
<li>Block the C2 domain <code>cheeshomireciple[.]com</code> at the DNS resolver to prevent initial payload delivery.</li>
<li>Monitor network connections for NetSupport RAT C2 communications on port 688 to detect compromised systems (IOCs: <code>poronto[.]com:688</code>, <code>giovettiadv[.]com:688</code>).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>clickfix</category><category>malware</category><category>social-engineering</category><category>rat</category><category>infostealer</category><category>castleloader</category><category>netsupport</category></item><item><title>UNC6692 Combines Social Engineering, Malware, and Cloud Abuse</title><link>https://feed.craftedsignal.io/briefs/2026-04-unc6692-social-engineering/</link><pubDate>Tue, 28 Apr 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-unc6692-social-engineering/</guid><description>UNC6692 is a newly discovered, financially motivated threat actor that combines social engineering via Microsoft Teams, custom malware named SNOWBELT, and abuse of legitimate AWS S3 cloud infrastructure in its attack campaigns to steal credentials and prepare for data exfiltration.</description><content:encoded><![CDATA[<p>UNC6692 is a newly tracked, financially motivated threat group that employs a multi-stage intrusion campaign combining persistent social engineering and custom modular malware. The actor begins by flooding a target&rsquo;s email inbox before contacting them via Microsoft Teams, posing as help desk personnel to resolve the issue. This leads to a phishing attack where victims are tricked into downloading and executing malicious payloads. UNC6692 abuses legitimate cloud infrastructure, specifically AWS S3 buckets, for payload delivery, command and control (C2), and data exfiltration, allowing them to bypass traditional network reputation filters. The group&rsquo;s operations are focused on gaining access and stealing credentials for further actions, ultimately aiming to exfiltrate data of interest from compromised systems. The initial campaign was observed in late December.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker floods a target&rsquo;s email inbox to create a sense of urgency.</li>
<li>The attacker contacts the target via Microsoft Teams, impersonating help desk personnel.</li>
<li>The attacker sends a phishing link via Teams, promising a local patch to fix the email spamming issue.</li>
<li>The target clicks the link, which downloads a renamed AutoHotKey binary and an AutoHotkey script from a threat actor-controlled AWS S3 bucket.</li>
<li>Execution of the AutoHotKey binary automatically runs the script, initiating reconnaissance commands and installing the SNOWBELT malicious Chromium browser extension.</li>
<li>SNOWBELT facilitates the download of additional tools, including the Snowglaze Python tunneler, the Snowbasin Python bindshell (used as a persistent backdoor), additional AutoHotkey scripts, and a portable Python executable with required libraries.</li>
<li>The attacker uses a Python script to scan the local network for ports 135, 445, and 3389 and enumerate local administrator accounts.</li>
<li>The attacker uses a local administrator account to initiate an RDP session via Snowglaze from the compromised system to a backup server, then dumps LSASS process memory and uses pass-the-hash to move laterally to the domain controller.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The UNC6692 attack leads to the compromise of targeted systems, credential theft, and potential data exfiltration. If successful, the attacker gains control over the domain controller, allowing them to access sensitive information and potentially cause significant damage to the organization. The abuse of AWS S3 buckets allows the threat actor to blend in with legitimate cloud traffic, making detection more difficult. The financial motivation suggests that stolen credentials and data could be used for further malicious activities, such as ransomware attacks or sale on the dark web.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for AutoHotKey execution, especially when associated with downloads from unusual locations like AWS S3 buckets, to detect initial payload execution (see Sigma rule below).</li>
<li>Implement network monitoring to detect unusual RDP connections initiated from compromised systems to internal servers, as this is a key lateral movement technique used by UNC6692 (see Sigma rule below).</li>
<li>Monitor for the installation of new Chromium extensions, especially those not distributed through the Chrome Web Store, as this is how the SNOWBELT malware is deployed.</li>
<li>Monitor for the use of Python scripts to scan the local network for open ports (135, 445, 3389) and enumerate local administrator accounts.</li>
<li>Investigate any Microsoft Teams messages delivering links that promise to fix technical problems, as this is the initial social engineering tactic used by UNC6692.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>social-engineering</category><category>malware</category><category>cloud-abuse</category><category>credential-theft</category><category>lateral-movement</category></item><item><title>Drift Protocol $280M Crypto Theft Linked to North Korean Hackers</title><link>https://feed.craftedsignal.io/briefs/2026-04-drift-hack/</link><pubDate>Mon, 06 Apr 2026 16:35:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-drift-hack/</guid><description>The Drift Protocol suffered a $280 million crypto theft orchestrated by North Korean hackers who spent six months building an in-person operational presence within the Drift ecosystem, engaging with contributors at crypto conferences and via Telegram.</description><content:encoded><![CDATA[<p>On April 1st, 2026, the Solana-based trading platform, Drift Protocol, experienced a sophisticated attack resulting in the theft of over $280 million. Investigations by Elliptic and TRM Labs point to North Korean hackers, possibly UNC4736 (also known as AppleJeus and Labyrinth Chollima), a threat actor previously linked to Lazarus. The attackers cultivated a presence within the Drift ecosystem over six months, posing as a quantitative firm. They approached Drift contributors in person at multiple crypto conferences, building trust and rapport. Communications continued via Telegram, where they discussed trading strategies and potential vault integrations, demonstrating technical proficiency and familiarity with Drift&rsquo;s operations. The Telegram group was deleted immediately after the theft.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Reconnaissance:</strong> The threat actors posed as a quantitative firm to gather information about Drift Protocol and its contributors.</li>
<li><strong>In-Person Engagement:</strong> The actors attended multiple crypto conferences, engaging with specific Drift contributors.</li>
<li><strong>Relationship Building:</strong> They communicated with targets via Telegram, discussing trading strategies and potential vault integrations.</li>
<li><strong>Potential Compromise:</strong> Two contributors were potentially compromised via a malicious code repository exploiting a VSCode/Cursor vulnerability allowing silent code execution, or via a malicious TestFlight application presented as a wallet product.</li>
<li><strong>Privilege Escalation:</strong> The attack allowed the hijacking of the Security Council administrative powers.</li>
<li><strong>Asset Draining:</strong> The attackers drained user assets in approximately 12 minutes.</li>
<li><strong>Data Removal:</strong> The Telegram group used for engaging contributors was deleted immediately after the theft.</li>
<li><strong>Funds Laundering:</strong> The stolen funds were likely transferred to attacker-controlled wallets and prepared for laundering, though the wallets have been flagged across exchanges and bridge operators.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The Drift Protocol suffered a loss of over $280 million, impacting users of the Solana-based trading platform. All Drift Protocol functions remain frozen, and the compromised wallets have been removed from the multisig process. The incident highlights the risks associated with social engineering and the importance of verifying the identities of individuals and organizations interacting with critical infrastructure. The attack has also raised concerns about the security practices within the cryptocurrency sector.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for unusual network activity and potential exploitation of VSCode/Cursor vulnerabilities via <code>process_creation</code> and <code>network_connection</code> logs using the &ldquo;Detect Suspicious VSCode Code Execution&rdquo; Sigma rule.</li>
<li>Monitor for suspicious applications installed via TestFlight, especially those presented as wallet products, using <code>file_event</code> logs and the &ldquo;Detect Suspicious TestFlight Application Installation&rdquo; Sigma rule.</li>
<li>Implement strict identity verification procedures for individuals and organizations interacting with sensitive systems and data.</li>
<li>Educate employees about social engineering tactics and the risks of interacting with unknown individuals or organizations.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>drift-protocol</category><category>crypto-theft</category><category>north-korea</category><category>unc4736</category><category>lazarus-group</category><category>social-engineering</category><category>supply-chain</category></item><item><title>Axios npm Package Compromised via Social Engineering</title><link>https://feed.craftedsignal.io/briefs/2026-04-axios-npm-hack/</link><pubDate>Sat, 04 Apr 2026 20:30:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-axios-npm-hack/</guid><description>North Korean threat actors (UNC1069) compromised the Axios npm package by socially engineering a maintainer with a fake Microsoft Teams update delivering a RAT, leading to the injection of a malicious dependency and a supply chain attack.</description><content:encoded><![CDATA[<p>On April 4, 2026, the maintainers of the Axios HTTP client disclosed a social engineering attack targeting one of their developers. The attack, attributed to the North Korean threat actor UNC1069, involved impersonating a legitimate company to build trust with the targeted developer. The attacker used a fake Microsoft Teams update disguised as a critical error fix to deploy a remote access trojan (RAT). This RAT allowed the attackers to gain access to the developer&rsquo;s system and npm credentials. The attackers then published two malicious versions of Axios (1.14.1 and 0.30.4) to the npm package registry. These malicious versions included a dependency called plain-crypto-js, which installed a RAT on macOS, Windows, and Linux systems. These versions were available for three hours, posing a supply chain risk to any systems that installed them during that period.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a target developer and initiates contact via LinkedIn/Slack, impersonating a legitimate company.</li>
<li>The attacker invites the developer to a Slack workspace populated with fake profiles and staged company activity.</li>
<li>A meeting is scheduled on Microsoft Teams, during which a fake &ldquo;RTC Connection&rdquo; error message is displayed.</li>
<li>The attacker prompts the developer to install a &ldquo;Teams update&rdquo; to resolve the error.</li>
<li>The fake update is a RAT malware, granting the attacker remote access to the developer&rsquo;s machine.</li>
<li>The attacker steals the developer&rsquo;s npm credentials, bypassing MFA due to already authenticated session.</li>
<li>The attacker publishes malicious versions of the Axios package (1.14.1 and 0.30.4) to the npm registry, injecting the plain-crypto-js dependency.</li>
<li>Systems installing the compromised Axios versions download and execute the plain-crypto-js package, resulting in RAT deployment and credential theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of the Axios npm package created a supply chain attack impacting an unknown number of systems across various sectors. Systems that installed the malicious versions (1.14.1 and 0.30.4) within the three-hour window are considered compromised. Successful exploitation results in the installation of a remote access trojan (RAT) capable of stealing credentials, browser data, and other sensitive information from macOS, Windows, and Linux systems. This can lead to further unauthorized access, data breaches, and potential financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor npm package installations for the presence of the plain-crypto-js dependency, particularly in projects that use Axios versions 1.14.1 or 0.30.4.</li>
<li>Implement multi-factor authentication (MFA) for npm accounts and other developer accounts, but recognize that authenticated sessions can be hijacked.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious NPM Package Installation&rdquo; to detect potentially malicious package installations based on unusual parent processes (see below).</li>
<li>Block the domain associated with the malicious dependency plain-crypto-js at the DNS resolver.</li>
<li>Educate developers about social engineering tactics and the risks of installing software from untrusted sources.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>supply chain attack</category><category>npm</category><category>social engineering</category><category>rat</category><category>unc1069</category></item><item><title>Democratization of Business Email Compromise (BEC) Attacks</title><link>https://feed.craftedsignal.io/briefs/2026-04-democratized-bec/</link><pubDate>Fri, 03 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-democratized-bec/</guid><description>Attackers are leveraging AI to rapidly reconnoiter and tailor content for smaller organizations, making it easier to execute business email compromise (BEC) scams and scam smaller sums from many victims, as demonstrated by a recent attack targeting a small community organization.</description><content:encoded><![CDATA[<p>Business Email Compromise (BEC) attacks have historically targeted large organizations with significant payouts justifying the required time investment. However, recent trends indicate a democratization of BEC, with smaller organizations becoming increasingly targeted. This shift is largely driven by the adoption of AI, enabling attackers to rapidly reconnoiter and tailor content for smaller organizations at scale. Attackers are now targeting smaller community associations, charities, and businesses, recognizing that scamming smaller sums from many victims can be as profitable as scamming large sums from a few. These organizations are often less aware of the threat and thus more vulnerable.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Reconnaissance:</strong> Attackers use AI-powered tools to gather information about target organizations and key personnel (e.g., community associations, small businesses).</li>
<li><strong>Impersonation:</strong> Attackers craft emails impersonating trusted individuals within the organization (e.g., the chair of the association).</li>
<li><strong>Request Initiation:</strong> The attacker sends an email requesting a fund transfer to an account they control, relying on social engineering to trick someone with payment authority.</li>
<li><strong>Evasion:</strong> The initial email is often sent from a plausible email address or a compromised genuine account.</li>
<li><strong>Account Compromise</strong>: Exploit React2Shell vulnerability (CVE-2025-55182) in Next.js applications to gain access to sensitive data, including cloud tokens, database credentials, and SSH keys, which are used for lateral movement.</li>
<li><strong>Data Exfiltration</strong>: Sensitive data, including cloud tokens, database credentials, and SSH keys, is exfiltrated using custom framework called &ldquo;NEXUS Listener&rdquo;.</li>
<li><strong>Obfuscation:</strong> Once received, funds typically pass through money mules or compromised personal accounts before being rapidly shuffled through multiple transfers, obscuring the trail.</li>
<li><strong>Financial Gain:</strong> The attacker successfully initiates the fund transfer and receives the money.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The democratization of BEC attacks expands the threat landscape to include vulnerable small organizations. While the individual sums may be smaller, the cumulative impact of successful attacks can be significant. If successful, organizations suffer financial losses, potential data breaches through stolen credentials (related to CVE-2025-55182), and reputational damage. The European Commission investigated a breach after an Amazon cloud account hack, highlighting the potential for data leaks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Educate employees, especially those with payment authority, about the signs of BEC scams, emphasizing unexpected requests for payment and the importance of verifying requests through separate channels (reference: Overview section).</li>
<li>Implement and enforce strict procurement rules that prevent any last-minute urgent payments (reference: Overview section).</li>
<li>Patch Next.js applications against React2Shell vulnerability (CVE-2025-55182) immediately and rotate potentially compromised credentials including API keys and SSH keys (reference: &ldquo;The one big thing&rdquo; section).</li>
<li>Deploy the following Sigma rule to detect suspicious process creation activity (reference: rules section).</li>
<li>Monitor for the presence of the malware files identified in the report using the provided SHA256 hashes (reference: IOCs section).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>business-email-compromise</category><category>bec</category><category>ai</category><category>social-engineering</category><category>credential-harvesting</category><category>exploitation</category></item><item><title>Palo Alto Networks Recruiting Impersonation Phishing Campaign</title><link>https://feed.craftedsignal.io/briefs/2026-03-panw-recruiting-scam/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-panw-recruiting-scam/</guid><description>Since August 2025, threat actors have been impersonating Palo Alto Networks talent acquisition staff in a sophisticated phishing campaign targeting senior professionals, using social engineering tactics to solicit fraudulent resume fees.</description><content:encoded><![CDATA[<p>Since August 2025, a series of phishing campaigns have impersonated Palo Alto Networks talent acquisition staff, targeting senior-level professionals. The attackers leverage scraped LinkedIn data to craft personalized lures, enhancing the credibility of their outreach. This campaign involves social engineering to manufacture a bureaucratic barrier related to the candidate&rsquo;s resume. The attackers falsely claim that the candidate&rsquo;s resume failed to meet the applicant tracking system (ATS) requirements. They then offer to assist the candidate in acquiring a position for a fee, typically ranging from $400 to $800 for services like &ldquo;executive ATS alignment&rdquo; or &ldquo;end-to-end executive rewrite.&rdquo; The goal is to exploit the candidate&rsquo;s professional ambitions by creating a sense of financial urgency and directing them to a third-party &ldquo;expert&rdquo; for paid services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Outreach:</strong> Attackers send personalized emails posing as Palo Alto Networks talent acquisition staff, using flattering language and details from the victim&rsquo;s LinkedIn profile.</li>
<li><strong>Establish Rapport:</strong> The emails use legitimate company logos and signatures to appear authentic and build trust with the targeted professional.</li>
<li><strong>Manufactured Crisis:</strong> Attackers claim the candidate&rsquo;s resume failed to meet ATS requirements, creating a bureaucratic barrier.</li>
<li><strong>Offer of Assistance:</strong> The &ldquo;recruiter&rdquo; offers &ldquo;executive ATS alignment&rdquo; services for a fee, suggesting an urgent need to update the resume.</li>
<li><strong>Hand-off to &ldquo;Expert&rdquo;:</strong> The candidate is directed to a purported expert who provides structured service offers with specific price points (e.g., $400, $600, $800).</li>
<li><strong>Time Pressure:</strong> The &ldquo;recruiter&rdquo; implies that the &ldquo;review panel&rdquo; has already begun, urging the candidate to update their CV within a limited timeframe.</li>
<li><strong>Payment Solicitation:</strong> The &ldquo;expert&rdquo; offers to deliver the CV within hours, fitting the ostensible review window, but only after payment.</li>
<li><strong>Financial Exploitation:</strong> Victims who comply with the demands pay for services that are never delivered, resulting in financial loss and potential identity theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This phishing campaign targets senior-level professionals, aiming to defraud them of hundreds of dollars through fabricated resume services. Multiple incidents have been reported, indicating a widespread effort to exploit individuals seeking job opportunities. If successful, victims lose money and may expose personal information, potentially leading to further identity theft or fraudulent activities. The campaign undermines trust in legitimate recruiting processes and damages the reputation of Palo Alto Networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement email filtering rules to flag messages from the IOC email addresses (paloaltonetworks@gmail[.]com, recruiter.paloalnetworks@gmail[.]com, phillipwalters006@gmail[.]com, posunrayi994@gmail[.]com).</li>
<li>Monitor network traffic and DNS queries for connections to domains resembling &ldquo;paloaltonetworks&rdquo; but with slight variations, as mentioned in the overview, and implement blocking where appropriate.</li>
<li>Educate employees and potential job candidates about this phishing scheme, emphasizing the importance of verifying recruiter identities and avoiding payment requests during the hiring process.</li>
<li>Deploy a Sigma rule to detect emails originating from free email providers (e.g. gmail.com) that claim to be from a specific organization based on email content and sender information (see rule below).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>phishing</category><category>recruiting</category><category>social-engineering</category><category>scam</category></item></channel></rss>