A sophisticated phishing campaign is actively targeting job seekers by impersonating Google Careers recruiters. Victims receive convincing emails that appear to originate from Salesforce subdomains, promising exclusive job opportunities. These messages contain a “View the role” button that redirects users to a counterfeit Google Careers portal hosted behind Cloudflare protection. Despite the presence of a captcha, the site is engineered to collect personal information and Gmail credentials. Once users click the link, they’re taken to a landing page requesting sensitive details such as name, phone number, and address. This data is transmitted to the attacker’s server at satoshicommands[.]com. Victims are then led to a fake Google sign-in page where they’re prompted to enter their Gmail login. Behind the scenes, a modified JavaScript file establishes a WebSocket connection and continuously polls the attacker’s server, which issues commands to guide users through OTP verification and multi-factor authentication, ultimately capturing their credentials. Open-source intelligence (OSINT) investigations have traced similar phishing instances over several months. Reports from Reddit and URLScan.io confirm repeated use of domains like apply[.]grecruitdigital[.]com and gteamhirehub[.]com. Attackers also deploy dynamic phishing sites via Vercel subdomains to evade detection, including puma-remotejobcenter[.]vercel[.]app and moburst-check[.]vercel[.]app. These tactics reveal a well-orchestrated infrastructure designed to bypass traditional security measures. To defend against such threats, individuals should verify recruiter emails by inspecting sender domains and hovering over links before clicking. Avoid entering credentials on unfamiliar sites, especially those behind unsolicited captchas. Organizations can block known malicious domains at the DNS level and implement email filters to detect spoofed Salesforce subdomains. Sharing threat intelligence and enforcing indicator-blocking rules are essential to counter this evolving phishing landscape.
A security researcher has found a critical flaw in the popular Worldline Yomani XR payment terminal, which could enable attackers to take complete control over the terminal within ...
In a coordinated global operation, international law enforcement agencies have seized the clearnet domain breachforums[.]hn, marking another major takedown of the notorious cybercr...
Trend Micro has uncovered a rapidly growing botnet campaign, RondoDox, which targets a broad range of internet-exposed devices — including routers, DVRs, CCTV systems, and indust...