{"id":3456,"date":"2026-04-01T07:49:00","date_gmt":"2026-04-01T14:49:00","guid":{"rendered":"http:\/\/www.wiki-living.com\/index.php\/2026\/04\/01\/looking-for-a-job-it-could-be-a-scam-nordvpn-reveals-phishing-campaign-pretending-to-be-top-brands\/"},"modified":"2026-04-02T03:35:40","modified_gmt":"2026-04-02T10:35:40","slug":"looking-for-a-job-it-could-be-a-scam-nordvpn-reveals-phishing-campaign-pretending-to-be-top-brands","status":"publish","type":"post","link":"https:\/\/www.wiki-living.com\/index.php\/2026\/04\/01\/looking-for-a-job-it-could-be-a-scam-nordvpn-reveals-phishing-campaign-pretending-to-be-top-brands\/","title":{"rendered":"Looking for a job? It could be a scam &#8211; NordVPN reveals phishing campaign pretending to be top brands"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div id=\"article-body\">\n<hr id=\"elk-3d3daa16-34e7-43ee-910b-ce466cf2b876\"\/>\n<ul id=\"elk-979223a1-6153-484a-b02d-878ce98cf5b8\">\n<li><strong>NordVPN<\/strong> <strong>researchers have uncovered a major phishing scam <\/strong><\/li>\n<li><strong>Scammers pretend to be global employers like Meta, Disney, Spotify<\/strong><\/li>\n<li><strong>Cybercriminals use fake job sites to steal job seekers&#8217; Facebook logins<\/strong><\/li>\n<\/ul>\n<hr id=\"elk-bba86ae0-1116-4056-8382-bb9f9b65d9bc\"\/>\n<p id=\"elk-e5492057-f191-4c32-a7e1-690134387d30\">The job market is tough enough without having to avoid cyber criminals. But according to new research from NordVPN, hackers are now posing as recruiters for the world&#8217;s biggest companies to hijack the social media accounts of unsuspecting job seekers.<\/p>\n<p>The cybersecurity firm&#8217;s Threat Intelligence unit uncovered a phishing campaign targeting the names of major employers, including Meta, Disney, Coca-Cola, and Spotify.<\/p>\n<aside data-block-type=\"embed\" data-render-type=\"fte\" data-skip=\"dealsy\" data-widget-type=\"seasonal\" class=\"hawk-root\"\/>\n<p id=\"elk-e5492057-f191-4c32-a7e1-690134387d30-2\">Rather than directly stealing your money, the service is designed to silently harvest your Facebook information. With social media accounts often linked to other sensitive applications and services, a compromised Facebook login can quickly turn into a devastating privacy breach.<\/p>\n<aside data-component-name=\"Recirculation:ArticleRiver\" data-recirculation-type=\"inline\" data-mrf-recirculation=\"Trending Bar\" data-nosnippet=\"\" class=\"clear-both pb-0 pt-2 mb-4\">\n        <span class=\"&#10;            flex&#10;            after:content-[''] after:flex-1 after:ml-4 after:my-[0.7rem] after:border-t after:border-solid after:border-t-[#ccc]&#10;            before:content-[''] before:flex-1 before:mr-4 before:my-[0.7rem] before:border-t before:border-solid before:border-t-[#ccc]&#10;            font-article-heading pb-0 !text-base uppercase sm:text-sm font-bold&#10;        \"><\/p>\n<p>            You might like it<br \/>\n        <\/span><\/p>\n<\/aside>\n<p>If you want to protect your personal data while applying for roles online, using one of the best VPN services with a built-in security system and malicious tracker blocking is a smart first step. However, staying completely safe from phishing requires a deep understanding of how these multi-stage scams really work.<\/p>\n<h2 id=\"from-fake-job-offer-to-full-account-hijack-3\">From fake job offers to full account hijacking<\/h2>\n<p id=\"elk-e182ee49-82ef-4476-948c-45615334479c\">The campaign begins with a professional-looking cold email, often sent through official platforms such as Google AppSheet to bypass standard spam filters.<\/p>\n<p>These messages include clean language and target victims whose contact information may have been leaked from platforms such as LinkedIn or exposed in previous data breaches.<\/p>\n<figure class=\"van-image-figure inline-layout\" data-bordeaux-image-check=\"\" id=\"elk-4c7cc186-5dc6-445a-aefb-f504b8c80037\">\n<div class=\"image-full-width-wrapper\">\n<div class=\"image-widthsetter\" style=\"max-width:1565px;\">\n<p class=\"vanilla-image-block\" style=\"padding-top:47.41%;\"> <picture data-new-v2-image=\"true\"><source type=\"image\/webp\" srcset=\"https:\/\/cdn.mos.cms.futurecdn.net\/nFJLhShGBvbfcaafq9zRci-1200-80.png.webp 1200w, https:\/\/cdn.mos.cms.futurecdn.net\/nFJLhShGBvbfcaafq9zRci-1024-80.png.webp 1024w, https:\/\/cdn.mos.cms.futurecdn.net\/nFJLhShGBvbfcaafq9zRci-970-80.png.webp 970w, https:\/\/cdn.mos.cms.futurecdn.net\/nFJLhShGBvbfcaafq9zRci-650-80.png.webp 650w, https:\/\/cdn.mos.cms.futurecdn.net\/nFJLhShGBvbfcaafq9zRci-480-80.png.webp 480w, https:\/\/cdn.mos.cms.futurecdn.net\/nFJLhShGBvbfcaafq9zRci-320-80.png.webp 320w\" sizes=\"(min-width: 1000px) 970px, calc(100vw - 40px)\"><\/source><\/picture><\/p>\n<\/div>\n<\/div><figcaption itemprop=\"caption description\" class=\" inline-layout\"><span class=\"credit\" itemprop=\"copyrightHolder\">(Image credit: NordVPN)<\/span><\/figcaption><\/figure>\n<p id=\"elk-1a3d835b-0e56-437e-88bb-5d524911a498\">Clicking on the email link takes victims to a &#8220;HUB&#8221; site (such as <em>careers.meta-findyourjob[.]com<\/em>).<\/p>\n<p>Interestingly, NordVPN discovered that these sites include a clever built-in avoidance strategy. When a security scanner or analyzer visits the URL directly, they only see a blank, harmless web page. The malicious &#8220;Search job&#8221; button only works if the site is launched by a unique link embedded in a phishing email.<\/p>\n<p>When the victim clicks, they land in a middleware that unmistakably mimics the job board of a legitimate business. Researchers have identified several fake sites, including <em>connect.spotifycareerapply[.]com<\/em> for Spotify and <em>jobquest.wdcfuturesteps[.]com<\/em> for Disney.<\/p>\n<figure class=\"van-image-figure inline-layout\" data-bordeaux-image-check=\"\" id=\"elk-f49faaa0-c59a-40a3-8bc9-57b793e3da5d\">\n<div class=\"image-full-width-wrapper\">\n<div class=\"image-widthsetter\" style=\"max-width:1600px;\">\n<p class=\"vanilla-image-block\" style=\"padding-top:55.25%;\"> <picture data-new-v2-image=\"true\"><source type=\"image\/webp\" srcset=\"https:\/\/cdn.mos.cms.futurecdn.net\/aWjeuediTFGrCh3SV5rRwg-1200-80.png.webp 1200w, https:\/\/cdn.mos.cms.futurecdn.net\/aWjeuediTFGrCh3SV5rRwg-1024-80.png.webp 1024w, https:\/\/cdn.mos.cms.futurecdn.net\/aWjeuediTFGrCh3SV5rRwg-970-80.png.webp 970w, https:\/\/cdn.mos.cms.futurecdn.net\/aWjeuediTFGrCh3SV5rRwg-650-80.png.webp 650w, https:\/\/cdn.mos.cms.futurecdn.net\/aWjeuediTFGrCh3SV5rRwg-480-80.png.webp 480w, https:\/\/cdn.mos.cms.futurecdn.net\/aWjeuediTFGrCh3SV5rRwg-320-80.png.webp 320w\" sizes=\"(min-width: 1000px) 970px, calc(100vw - 40px)\"><img decoding=\"async\" alt=\"A screenshot showing a fake Facebook login command\" srcset=\"https:\/\/cdn.mos.cms.futurecdn.net\/aWjeuediTFGrCh3SV5rRwg-1200-80.png 1200w, https:\/\/cdn.mos.cms.futurecdn.net\/aWjeuediTFGrCh3SV5rRwg-1024-80.png 1024w, https:\/\/cdn.mos.cms.futurecdn.net\/aWjeuediTFGrCh3SV5rRwg-970-80.png 970w, https:\/\/cdn.mos.cms.futurecdn.net\/aWjeuediTFGrCh3SV5rRwg-650-80.png 650w, https:\/\/cdn.mos.cms.futurecdn.net\/aWjeuediTFGrCh3SV5rRwg-480-80.png 480w, https:\/\/cdn.mos.cms.futurecdn.net\/aWjeuediTFGrCh3SV5rRwg-320-80.png 320w\" sizes=\"(min-width: 1000px) 970px, calc(100vw - 40px)\" loading=\"lazy\" data-new-v2-image=\"true\" src=\"https:\/\/cdn.mos.cms.futurecdn.net\/aWjeuediTFGrCh3SV5rRwg.png\" data-pin-media=\"https:\/\/cdn.mos.cms.futurecdn.net\/aWjeuediTFGrCh3SV5rRwg.png\" class=\"inline\"\/><br \/>\n<\/source><\/picture><\/p>\n<\/div>\n<\/div><figcaption itemprop=\"caption description\" class=\" inline-layout\"><span class=\"credit\" itemprop=\"copyrightHolder\">(Image credit: NordVPN)<\/span><\/figcaption><\/figure>\n<p id=\"elk-55b97df7-0fa1-461f-8a33-63da1d291629\">The trap finally closes when the applicant clicks &#8220;Apply.&#8221; Instead of a standard application form, they were met with a request to log in via Facebook to proceed. This fake login page captures the victim&#8217;s username and password, giving attackers complete control over the account.<\/p>\n<aside data-component-name=\"Recirculation:ArticleRiver\" data-recirculation-type=\"inline\" data-mrf-recirculation=\"Trending Bar\" data-nosnippet=\"\" class=\"clear-both pb-0 pt-2 mb-4\">\n        <span class=\"&#10;            flex&#10;            after:content-[''] after:flex-1 after:ml-4 after:my-[0.7rem] after:border-t after:border-solid after:border-t-[#ccc]&#10;            before:content-[''] before:flex-1 before:mr-4 before:my-[0.7rem] before:border-t before:border-solid before:border-t-[#ccc]&#10;            font-article-heading pb-0 !text-base uppercase sm:text-sm font-bold&#10;        \"><\/p>\n<p>            What you can read next<br \/>\n        <\/span><\/p>\n<\/aside>\n<p>Domininkas Virbickas, product director at NordVPN, explains that job seekers are &#8220;uniquely vulnerable&#8221; to these types of attacks as they are already in the mindset of sharing personal information and following instructions from contacts they don&#8217;t know.<\/p>\n<p>&#8220;Such campaigns exploit that trust using sophisticated communications and convincing fake job sites that are almost indistinguishable from the real thing,&#8221; Virbickas said.<\/p>\n<h2 id=\"how-to-stay-safe-during-your-job-hunt-3\">How to stay safe while job hunting<\/h2>\n<p id=\"elk-ea430022-f0f9-406f-a908-23313130076a\">To protect yourself, NordVPN recommends making a habit of validating the URL before entering any personal data. Legitimate mega-brands will always host their job pages on legitimate, visible domains, not random third-party links.<\/p>\n<p>The same rule applies to public access orders. The actual &#8220;Sign in with Facebook&#8221; button will always safely redirect you to the main page <em>facebook.com<\/em> background. If the URL bar shows anything else, close the tab immediately.<\/p>\n<p>If you&#8217;re still in doubt, I recommend running the link with NordVPN&#8217;s URL checker tool or similar software. It is completely free to use for anyone, even those who do not have an active NordVPN subscription.<\/p>\n<p>Finally, NordVPN suggests always enabling two-factor authentication (2FA) on all your social media profiles. Even if a phishing page manages to steal your password, 2FA acts as an important safety net that prevents attackers from accessing your account.<\/p>\n<aside data-model-name=\"NordVPN\" data-widget-type=\"review\" data-render-type=\"editorial\" class=\"hawk-root\">\n<div class=\"hawk-main-editorial-container\">\n<div>\n<p>Today&#8217;s deals for NordVPN<\/p>\n<\/div>\n<\/div>\n<\/aside>\n<hr id=\"elk-0b15d41c-203e-4fae-868f-fcdc3bd7e88b\"\/>\n<p id=\"elk-cff795ea-25c3-4827-bbf3-bd98c0d33eaf\"><em><strong>Follow TechRadar for Google news<\/strong><\/em>    again<em> <\/em><em><strong>add us as a favorite resource<\/strong><\/em><em>    to get our expert news, reviews, and opinions in your feed. Be sure to click the Follow button!<\/em><\/p>\n<hr id=\"elk-f60247e9-09e4-4648-b2e3-75d55584e3d6\"\/>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>NordVPN researchers have uncovered a major phishing scam Scammers pretend to be global employers like Meta, Disney, Spotify Cybercriminals use fake job sites to steal job seekers&#8217; Facebook logins The job market is tough enough without having to avoid cyber criminals. But according to new research from NordVPN, hackers are now posing as recruiters for [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3457,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[27],"tags":[],"class_list":{"0":"post-3456","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-smart-home-gadgets"},"_links":{"self":[{"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/posts\/3456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/comments?post=3456"}],"version-history":[{"count":1,"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/posts\/3456\/revisions"}],"predecessor-version":[{"id":3458,"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/posts\/3456\/revisions\/3458"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/media\/3457"}],"wp:attachment":[{"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/media?parent=3456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/categories?post=3456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wiki-living.com\/index.php\/wp-json\/wp\/v2\/tags?post=3456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}