Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

1/24/2020
09:30 AM
50%
50%

Online Employment Scams on the Rise, Says FBI

Looking to change jobs? Watch out for fraudsters who use legitimate job services, slick websites, and an interview process to convince applicants to part with sensitive personal details.

Online fraudsters are increasingly targeting job seekers by posing as legitimate employers, conducting interviews, and then "hiring" the victim, at which time they request personal and financial data, according to an advisory issued by the FBI's Internet Criminal Complain Center earlier this week.

The long con often results in victims giving up Social Security numbers, direct deposit information, and even images of driver's licenses. The scam often ends by the "employer" asking the victim to pay fees or purchase equipment to work from home, after which the criminals break off communications. The average victim loses $3,000, according to the FBI advisory.

While such employment scams are not new, the level of involvement in the latest iteration of the online scam makes it stands out, the FBI said.

"While hiring scams have been around for many years, cyber criminals’ emerging use of spoofed websites to harvest PII (personally identifiable information) and steal money shows an increased level of complexity," the FBI stated in the advisory. "Criminals often lend credibility to their scheme by advertising alongside legitimate employers and job placement firms, enabling them to target victims of all skill and income levels."

The increase in attacks underscores a general trend of criminals targeting business processes. Business e-mail compromise — the largest source of fraud by potential losses, for example — accounted for more than 20,300 complaints in 2018, the IC3 stated in its last annual report. The fraud put more than $1.3 billion at risk, compared to less than $4 million for ransomware that year, although the FBI has questioned whether the ransomware figure is accurate since victims frequently do not report ransomware attacks.

Employment fraud consisted of almost 15,000 incidents, accounting for more than $45 million in losses in 2018, according to that report.

The fraud has employment services and job-posting aggregators on watch. Job search site Indeed, for example, has a search-quality team who searches out fraudulent advertisements and job postings, although the company did not provide data on the number of fraudulent postings it removes each year.

"Jobseekers should never agree to send payment to a potential employer, and charging fees is a violation of Indeed's rules for companies posting on our site," the company said in a statement to Dark Reading. "We encourage job seekers to review our Guidelines for Safe Job Search."

Indeed is not the only organization to urge applicants to be on the lookout. College seniors and new college graduates are often targeted, and schools issue warnings for the relatively inexperienced applicants to look out for employment fraud schemes, including verifying that postings are from legitimate companies.

The University of Southern California, for example, warns job seekers to beware of a number of signs, such as "the posting appears to be from a reputable, familiar organization — often a Fortune 500 — yet, the email handle in the contact's email address does not match the domain used by representatives of the organization."

Yet online fraudsters are going for longer and more involved schemes to try to work around such advice. While USC warns applicants to not provide Social Security numbers or driver's license information in the initial application, fraudsters are now offering jobs and requesting such information during the onboarding process, the FBI stated. Interviews are increasingly conducted as part of the extended scam.

"Applicants are contacted by email to conduct an interview using a teleconference application," the FBI stated. "According to victims, cyber criminals impersonate personnel from different departments, including recruiters, talent acquisition, human resources, and department managers."

The FBI listed a variety of telltale signals that should tip off a job seeker that they should look deeper at their prospective employer. If interviews are not conducted in-person or through a secure video connection, that should raise red flags, the advisory stated. In addition, the job seeker should be suspicious if an employer requests financial information or a credit card to purchase startup equipment. 

Finally, work-at-home jobs that pay high initial salaries for inexperienced workers is another sign to question the job posting.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "The Y2K Boomerang: InfoSec Lessons Learned from a New Date-Fix Problem."

 

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-4537
PUBLISHED: 2020-02-26
IBM WebSphere Service Registry and Repository 8.5 could allow a user to obtain sensitive version information that could be used in further attacks against the system. IBM X-Force ID: 165593.
CVE-2019-4596
PUBLISHED: 2020-02-26
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session...
CVE-2019-4597
PUBLISHED: 2020-02-26
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 167880.
CVE-2019-4598
PUBLISHED: 2020-02-26
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 167881.
CVE-2019-4726
PUBLISHED: 2020-02-26
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 172363.