Description

A sophisticated phishing campaign is actively targeting job seekers by impersonating Google Careers recruiters. Victims receive convincing emails that appear to originate from Salesforce subdomains, promising exclusive job opportunities. These messages contain a “View the role” button that redirects users to a counterfeit Google Careers portal hosted behind Cloudflare protection. Despite the presence of a captcha, the site is engineered to collect personal information and Gmail credentials. Once users click the link, they’re taken to a landing page requesting sensitive details such as name, phone number, and address. This data is transmitted to the attacker’s server at satoshicommands[.]com. Victims are then led to a fake Google sign-in page where they’re prompted to enter their Gmail login. Behind the scenes, a modified JavaScript file establishes a WebSocket connection and continuously polls the attacker’s server, which issues commands to guide users through OTP verification and multi-factor authentication, ultimately capturing their credentials. Open-source intelligence (OSINT) investigations have traced similar phishing instances over several months. Reports from Reddit and URLScan.io confirm repeated use of domains like apply[.]grecruitdigital[.]com and gteamhirehub[.]com. Attackers also deploy dynamic phishing sites via Vercel subdomains to evade detection, including puma-remotejobcenter[.]vercel[.]app and moburst-check[.]vercel[.]app. These tactics reveal a well-orchestrated infrastructure designed to bypass traditional security measures. To defend against such threats, individuals should verify recruiter emails by inspecting sender domains and hovering over links before clicking. Avoid entering credentials on unfamiliar sites, especially those behind unsolicited captchas. Organizations can block known malicious domains at the DNS level and implement email filters to detect spoofed Salesforce subdomains. Sharing threat intelligence and enforcing indicator-blocking rules are essential to counter this evolving phishing landscape.