Resume-themed campaigns in the last two months have doubled in the US, according to Check Point, with one in 450 malicious files being a resume-related scam.
Check Point has observed threat actors using infected resume documents to spread Zloader malware. Malicious .xls files with subjects such as “applying for a job” or “regarding job” were sent to unsuspecting users.
Victims were then asked to enable content when opening the infected files. In doing so, a malicious macro began running in the background to download the final payload onto a user’s device. Once a user’s device was successfully infected, threat actors could use the malware to carry out financial transactions on the device.
The software company also discovered a campaign using medical leave forms that delivered the Icedid malware, another banking trojan designed to steal a user’s financial data. The emails were sent from different sender domains such as “medical-center.space” and used subjects citing the Family and Medical Leave Act (FMLA) to lure victims into opening malicious email attachments using file names like “COVID -19 FLMA CENTER.doc.”
A similar FMLA-themed campaign delivered banking trojan Trickbot. In this particular cyberattack, emails being sent from domains such as “covid-agency.space” sought to trick unsuspecting users into opening malicious email attachments.
To prevent themselves from falling victim to these resume and FMLA-themed attacks, Check Point Software reminds users to be aware of lookalike domains and unfamiliar email senders. Check Point Software also cautions users against opening file attachments from unknown senders, especially if the attachments prompt users to do something they wouldn’t.
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2023.