#typosquatted

๐Ÿ’ผ Recruitment-Themed #Phishing Campaigns Target Facebook Users.
๐Ÿšจ A new wave of phishing attacks is targeting job seekers with fake job offers impersonating brands like Red Bull, Tesla, Meta AI, and others. Attackers use #spearphishing emails to lure victims into applying for fictional positions by logging in via Facebook. These campaigns often spoof legitimate recruitment platforms like indeed[.]com using #typosquatted domains.

๐Ÿ‘จโ€๐Ÿ’ป See analysis sessions:
Porsche: app.any.run/tasks/cce7aac5-0ce
Tesla: app.any.run/tasks/1ec08aeb-908
Red Bull: app.any.run/tasks/7360ea7f-049

โš ๏ธ Even though the pages mimic legitimate job platforms, several red flags expose #malicious behavior:
๐Ÿ”น No redirection to Facebookโ€™s official SSO
๐Ÿ”น IP fingerprinting via services like ipapi and ipify
๐Ÿ”น In some cases, exfiltration of credentials using socket[.]io and attacker-controlled Telegram bots

๐Ÿ” Search for Red Bull-themed recruitment phishing using TI Lookup:
intelligence.any.run/analysis/

Another observed trend includes the abuse of indeed[.]com through #typosquatting: lndeed[.]com. See example: app.any.run/tasks/fce3c537-de6

๐Ÿ” Find more typosquatted domains using this TI Lookup request:
intelligence.any.run/analysis/

๐Ÿ”— Execution chain:
Phishing email or link โžก๏ธ Fake job offer โžก๏ธ Fake Facebook login form โžก๏ธ Credentials & IP exfiltration via WebSocket or Telegram bot

๐Ÿ›ก๏ธ Recommendation for users and organizations:
๐Ÿ”น Always enable 2FA
๐Ÿ”น Cross-check job offers on official company websites
๐Ÿ”น Avoid disclosing PII unless interacting via verified recruiting platforms like LinkedIn or Indeed

#IOCs:
aimetahire [.] com
aimetajobs [.] com
aimetatalents [.] com
applyjobfast [.] com
jobapplycareer [.] com
redbullrecruit [.] com
redbullrecruitee [.] com
redbulltalents [.] com
tesla-recruit [.] com
lndeed [.] help
applyopenjobsonlndeed [.] space
lndeedresume [.] com

๐Ÿš€ Use #ANYRUN Interactive Sandbox to analyze suspicious emails and URLs, extract #IOCs, and uncover hidden network activity, such as external IP gathering.

โš ๏ธ Ongoing phishing campaign targeting #Steam users
A large-scale attack is currently underway, aiming to steal usersโ€™ login credentials and banking information. The #phishing pages closely mimic official Steam services.

๐Ÿ‘จโ€๐Ÿ’ป Take a look at the analysis: app.any.run/tasks/35d57f3d-c8b

TI Lookup helps you find domains and URLs with ๐˜„๐—ถ๐—น๐—ฑ๐—ฐ๐—ฎ๐—ฟ๐—ฑ๐˜€ and ๐—ผ๐—ฝ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ผ๐—ฟ๐˜€ for more precise and flexible threat intelligence searches

๐ŸŽฃ Examples of #phish addresses:
steamcommunity.app437991[.]com
steamcommunity[.]network
steamcommunity.wallpaperengineshowcase[.]com
speamcoonnmumnlty[.]com

๐Ÿ” Use combined search in #ANYRUN Threat Intelligence Lookup to find #typosquatted domains and URLs and keep your defenses sharp:
intelligence.any.run/analysis/

#cybersecurity #infosec

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst