FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters

Avatar

Cybercriminals from the long-running FIN6 group are posing as job seekers on platforms like LinkedIn to infect recruiters with malware delivered through fake resumes, according to a new report.

Recruitment scams are common among cybercrime gangs, but this is a new tactic for FIN6, which is better known for stealing payment card data and breaching point-of-sale (PoS) systems in the hospitality and retail sectors, researchers at security firm DomainTools said.

In their latest campaign, the hackers — also tracked as Skeleton Spider — initiate interactions with recruiters on platforms such as LinkedIn and Indeed and, after gaining their trust, send malicious phishing emails that deliver a backdoor known as MoreEggs.

The phishing emails are professionally written and contain no clickable links — forcing recipients to manually type a URL, which helps the messages bypass security filters. The links direct recruiters to landing pages that mimic personal resume portfolios.

These sites are hosted on trusted cloud infrastructure, including Amazon Web Services (AWS), to evade detection. The landing pages use traffic filtering and CAPTCHA to ensure that only human recruiters — rather than automated analysis tools — are targeted with the malware.

Once the visitor is verified, the site delivers a malicious ZIP file containing the MoreEggs backdoor. This tool was developed by a threat actor tracked as Venom Spider and is sold as malware-as-a-service. FIN6 uses it to access the targeted system, steal credentials and carry out ransomware attacks.

FIN6 has been active since at least 2015 and has sold millions of payment card numbers on underground criminal marketplaces. The group’s latest recruitment scams confirm that its focus is shifting to broader enterprise threats, including ransomware operations, researchers said.

CybercrimeNewsNews BriefsMalware
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure

Next Post

295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager

Related Posts

AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar

AI is changing everything — from how we code, to how we sell, to how we secure. But while most conversations focus on what AI can do, this one focuses on what AI can break — if you’re not paying attention. Behind every AI agent, chatbot, or automation script lies a growing number of non-human identities — API keys, service accounts, OAuth tokens — silently operating in the background. And here’s
Avatar
Read More

Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands

The threat actor known as Bitter has been assessed to be a state-backed hacking group that's tasked with gathering intelligence that aligns with the interests of the Indian government. That's according to new findings jointly published by Proofpoint and Threatray in an exhaustive two-part analysis. "Their diverse toolset shows consistent coding patterns across malware families, particularly in
Avatar
Read More

CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security flaw impacting SonicWall Secure Mobile Access (SMA) 100 Series gateways to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The high-severity vulnerability, tracked as CVE-2021-20035 (CVSS score: 7.2), relates to a case of operating system command injection
Avatar
Read More