‘Monster’ phishing of recruitment website
Fraudsters look to target credit-crunch affected jobseekers, and find that new phishing kits are making their jobs even easier

A new phishing scam targeting users of the recruitment website Monster.com has been discovered by researchers at McAfee.
It is part of a trend by criminals to target recruitment websites, which like social networks, contain personal and sensitive data carried in carried in CV's and databases.
Monster.com has been targeted by criminals before last year it was victim of two security breaches caused by a trojan attack, which resulted in the details of 1.3 million US job seekers being exposed.
The latest attack works by sending potential victims emails which ask users to click through and update their profile, but is traced back to a bot in Turkey.
McAfee said that the scammers were trying to get through to recruiter's accounts and gain access to CVs which can sometimes hold valuable information.
Like the recent trend for scammers targeting social networks, McAfee security analyst Greg Day felt that criminals were taking advantage of the current economic climate, with users increasingly using the internet to find new jobs to see what is available.
He said: "The repercussions of this are potentially huge. If a cyber criminal is able to access a large number of CVs, the information obtained could easily be used for malicious intent.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"As far as cyber criminals are concerned, CVs offer a goldmine of information, so this would be a major result for them."
A RSA Online Fraud Report' was also released which said that collecting the data given by victims through phishing attacks was being made much easier thanks to new phishing kits that are designed to directly store data in a MySQL database on a phishing server.
Previously the stolen information would have been sent as text to the fraudster's email address coded within PHP files, or simply stored on the server as a text file.
-
Anthropic CEO Dario Amodei thinks we're burying our heads in the sand on AI job losses
News With AI set to hit entry-level jobs especially, some industry execs say clear warning signs are being ignored
-
AI security blunders have cyber professionals scrambling
News Growing AI security incidents have cyber teams fending off an array of threats
-
RSAC Conference 2025: AI and quantum complicate security
Organizations are grappling with the complications of adopting AI for security
-
RSAC Conference 2025 was a sobering reminder of the challenges facing cybersecurity professionals
Analysis Despite widespread optimism on how AI can help those in cybersecurity, it’s clear that the threat landscape is more complex than ever
-
RSAC Conference day three: using AI to do more with less and facing new attack techniques
-
"There needs to be an order of magnitude more effort": AI security experts call for focused evaluation of frontier models and agentic systems
News Evaluating the risks of dynamic, evolving AI networks is slow work for cybersecurity analysts
-
Cyber defenders need to remember their adversaries are human, says Trellix research head
There's a growing overlap between nation-state actors and cybercriminals, but these attackers are real people who make mistakes
-
RSAC Conference day two: A focus on new hacking tactics
From quantum to AI, experts discussed how new and experimental technologies could be used by hackers to access and decrypt sensitive data
-
RSAC Conference Day One: Vibe Is 'All In' on AI for Security
News Artificial intelligence took center stage as RSAC Conference looks at how the discussion has moved from generative AI to agentic AI
-
RSAC Conference 2025 live: All the latest from day three
Live blog ITPro is covering RSAC Conference 2025 live – find out all the day-three news right here