Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

09:30 AM

Online Employment Scams on the Rise, Says FBI

Looking to change jobs? Watch out for fraudsters who use legitimate job services, slick websites, and an interview process to convince applicants to part with sensitive personal details.

Online fraudsters are increasingly targeting job seekers by posing as legitimate employers, conducting interviews, and then "hiring" the victim, at which time they request personal and financial data, according to an advisory issued by the FBI's Internet Criminal Complain Center earlier this week.

The long con often results in victims giving up Social Security numbers, direct deposit information, and even images of driver's licenses. The scam often ends by the "employer" asking the victim to pay fees or purchase equipment to work from home, after which the criminals break off communications. The average victim loses $3,000, according to the FBI advisory.

While such employment scams are not new, the level of involvement in the latest iteration of the online scam makes it stands out, the FBI said.

"While hiring scams have been around for many years, cyber criminals’ emerging use of spoofed websites to harvest PII (personally identifiable information) and steal money shows an increased level of complexity," the FBI stated in the advisory. "Criminals often lend credibility to their scheme by advertising alongside legitimate employers and job placement firms, enabling them to target victims of all skill and income levels."

The increase in attacks underscores a general trend of criminals targeting business processes. Business e-mail compromise — the largest source of fraud by potential losses, for example — accounted for more than 20,300 complaints in 2018, the IC3 stated in its last annual report. The fraud put more than $1.3 billion at risk, compared to less than $4 million for ransomware that year, although the FBI has questioned whether the ransomware figure is accurate since victims frequently do not report ransomware attacks.

Employment fraud consisted of almost 15,000 incidents, accounting for more than $45 million in losses in 2018, according to that report.

The fraud has employment services and job-posting aggregators on watch. Job search site Indeed, for example, has a search-quality team who searches out fraudulent advertisements and job postings, although the company did not provide data on the number of fraudulent postings it removes each year.

"Jobseekers should never agree to send payment to a potential employer, and charging fees is a violation of Indeed's rules for companies posting on our site," the company said in a statement to Dark Reading. "We encourage job seekers to review our Guidelines for Safe Job Search."

Indeed is not the only organization to urge applicants to be on the lookout. College seniors and new college graduates are often targeted, and schools issue warnings for the relatively inexperienced applicants to look out for employment fraud schemes, including verifying that postings are from legitimate companies.

The University of Southern California, for example, warns job seekers to beware of a number of signs, such as "the posting appears to be from a reputable, familiar organization — often a Fortune 500 — yet, the email handle in the contact's email address does not match the domain used by representatives of the organization."

Yet online fraudsters are going for longer and more involved schemes to try to work around such advice. While USC warns applicants to not provide Social Security numbers or driver's license information in the initial application, fraudsters are now offering jobs and requesting such information during the onboarding process, the FBI stated. Interviews are increasingly conducted as part of the extended scam.

"Applicants are contacted by email to conduct an interview using a teleconference application," the FBI stated. "According to victims, cyber criminals impersonate personnel from different departments, including recruiters, talent acquisition, human resources, and department managers."

The FBI listed a variety of telltale signals that should tip off a job seeker that they should look deeper at their prospective employer. If interviews are not conducted in-person or through a secure video connection, that should raise red flags, the advisory stated. In addition, the job seeker should be suspicious if an employer requests financial information or a credit card to purchase startup equipment. 

Finally, work-at-home jobs that pay high initial salaries for inexperienced workers is another sign to question the job posting.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "The Y2K Boomerang: InfoSec Lessons Learned from a New Date-Fix Problem."


Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
5/25/2020 | 11:42:13 AM
Worl from home job Scam
Thanks for sharing this useful post! I also got a call for work from home jobs in 2020 from one of the MLM firm and the story is the same as shared in your post.  
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Attacker Dwell Time: Ransomware's Most Important Metric
Ricardo Villadiego, Founder and CEO of Lumu,  9/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-09-30
An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitra...
PUBLISHED: 2020-09-30
An issue was discovered in file_download.php in MantisBT before 2.24.3. Users without access to view private issue notes are able to download the (supposedly private) attachments linked to these notes by accessing the corresponding file download URL directly.
PUBLISHED: 2020-09-30
An issue was discovered in MantisBT before 2.24.3. Improper escaping of a custom field's name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when attempting to update said custom field via bug_actiongroup_page.php.
PUBLISHED: 2020-09-30
In Oniguruma 6.9.5_rev1, an attacker able to supply a regular expression for compilation may be able to overflow a buffer by one byte in concat_opt_exact_str in src/regcomp.c .
PUBLISHED: 2020-09-30
A DLL Hijacking vulnerability in Eaton's 9000x Programming and Configuration Software v 2.0.38 and prior allows an attacker to execute arbitrary code by replacing the required DLLs with malicious DLLs when the software try to load vci11un6.DLL and cinpl.DLL.