WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Threat Awareness – Threat Actors Target Recruiters Posing as Job Applicants
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Awareness – Threat Actors Target Recruiters Posing as Job Applicants

Author: Chase Snow

Created: Tuesday, June 11, 2024 - 17:46

Categories: Cybersecurity, Security Preparedness

Cybersecurity researchers have recently identified a phishing campaign designed to distribute More_eggs malware through malicious resumes in fake job applications. This attack specifically targets recruiters, whereby posing as a job applicant, the threat actor lures the recruiter to a malicious website. More_eggs malware acts as a backdoor and is capable of harvesting sensitive information. It operates under a Malware-as-a-Service (MaaS) model making it available to other less-sophisticated threat actors, expanding its use.

According to reporting, the latest attack chain entails the malicious actors responding to LinkedIn job postings with a link to a fake resume download site that results in the download of a malicious Windows Shortcut file (LNK). It’s also worth noting that previous More_eggs activity has targeted professionals on LinkedIn with weaponized job offers to trick them into downloading the malware.

While this is not a new tactic, this campaign is another example how threat actors use social engineering techniques to target various staff with relevant and expected themes. Members are encouraged to offer job-specific security awareness training about this tactic to human resources and other staff involved in job recruitment. For more information, visit The Hacker News. 

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar