Funnel overlay image

Blog | 3-minute Read

Phishing alert: Beware of fraudulent job application attacks

Ellis Southan

Threat Detection Engineer

Published: 17 December 2024

Discover how threat actor TA4557’s sophisticated phishing campaign is targeting recruiters through fake job applications. Uncover their advanced techniques and how security teams and staff can identify these malicious threats.

Since October 2023, TA4557, a known cyber threat actor, has been deploying a new phishing tactic targeting recruiters.

By disguising malicious emails as job applications, the group aims to lure unsuspecting professionals into malware infections.

It’s an approach that highlights how cyber criminals are always looking to exploit potential vulnerabilities in professional workflows.

Who is TA4557?

Active since 2018, TA4557 has been closely monitored across the cybersecurity community. This financially motivated actor is infamous for its advanced techniques and proprietary tools.

They’ve previously been observed distributing the well-publicised More_Eggs backdoor, a piece of malware capable of creating profiles of infected systems and delivering harmful payloads.

TA4557 is also linked to advanced threat groups such as Evilnum and Cobalt Group, sharing overlapping methods and tools. Their campaigns are targeted, persistent, and marked by clever evasion tactics, making them a formidable adversary in the cyber threat landscape.

How the attack works

TA4557’s attacks are carefully crafted to deceive and evade.

Here’s how they unfold:

1. Initial contact: TA4557 sends recruiters emails posing as job candidates. These emails look authentic and are designed to get a response from the recruiter.

2. Delivery of a malicious link: Any recruiter who replies to the initial email then receives a link to a website claiming to host the candidate’s CV.

Source: Proofpoint

3. Malware deployment: The page contains a button or link prompting the recruiter to download the CV. Clicking downloads a .zip archive containing a malicious shortcut file (.LNK). Running the file triggers a “Living Off the Land” attack, leveraging legitimate Windows processes, such as ie4uinit.exe, to download and execute a scriptlet.

4. Persistence mechanisms: The scriptlet installs a DLL file in the %APPDATA%\Microsoft folder and uses Windows Management Instrumentation (WMI) to create a registry process that ensures the DLL’s execution.

5. Evasion tactics: The malware is designed to retrieve the RC4 encryption key needed to activate the More_Eggs backdoor, showcasing TA4557’s advanced operational stealth.

A textbook case of social engineering in action

The group’s success has been heavily influenced by their application of advanced social engineering tactics.

By engaging victims in legitimate conversations via non-malicious communication they establish trust and legitimacy. The perfect foil from which to deliver the malicious payloads and content.

It’s a tactic that can cause problems for many modern detection tools that focus on detecting immediate threats. This calculated approach makes their attacks particularly challenging to identify and stop.

Indicators of compromise

Proofpoint have provided indicators of compromise to be used in endpoint protection services.

  • annetterawlings\.com
    • Type: Domain
  • 9d9b38dffe43b038ce41f0c48def56e92dba3a693e3b572dbd13d5fbc9abc1e4
    • Type: SHA256
  • 6ea619f5c33c6852d6ed11c52b52589b16ed222046d7f847ea09812c4d51916d
    • Type: SHA256
  • 010b72def59f45662150e08bb80227fe8df07681dcf1a8d6de8b068ee11e0076
    • Type: SHA256

How to protect yourself and your organisation

Detecting attacks like these can be hard, especially in the early ‘benign’ stages.

And as the threat actors specifically target recruiters, the communications can often avoid being pinged as suspicious.

Of course, having a Security Operations Centre (SOC) with the most up to date and sophisticated detection technology can help spot behaviour patterns or anomalies beyond simple content scanning.

Moreover, this is a risk that again highlights the critical importance of creating a security-first and risk-aware culture across organisations.

Which is why Kocho strongly advocates ongoing training and assessments that continually drum in the importance of remaining vigilant. Upskilling everyone’s ability to spot potential phishing or other social engineering tactics.

Talk to our team to find out about how we can help with phishing and security awareness programmes for your organisation. And download our free guide to modern phishing trends below.

Key takeaways

  • TA4557 targets recruiters with fake job applications.

  • Attacks use malicious CV links to deploy malware.

  • Social engineering builds trust before delivering payloads.

  • Malware evades detection using legitimate Windows processes.

  • Early-stage attacks appear harmless, bypassing tools.

  • Training and advanced SOC tech are key defences.

tag icon

Free Report

Phishing and Cyber Behaviour Trends

Who’s clicking on what? Why? And are your employees reporting threats?

Download Hoxhunt’s Phishing report and find out:

  • Phishing threats that pose the highest risk
  • Average time to identify and contain a breach
  • Highly targeted and highly susceptible industries
tag icon

Great protection starts here

Keep pace with the latest security threats

Sign up to receive the latest threat intelligence articles and reports from our SecOps team.

You’ll get:

  • Notifications of critical vulnerabilities
  • Recommendations to reduce your risk level
  • Expert advice to defend against new threats
Butterfly overlay image

Author

Ellis Southan

Threat Detection Engineer

Ellis has been working in security operations since 2017. He excels in incident analysis, security engineering, and cyber threat intelligence.

Butterfly overlay image

Got a question? Need more information?

Our expert team is here to help.