Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Posing as Google Careers Recruiter to Steal Gmail Login Details

Posted on October 1, 2025October 1, 2025 By CWS

A classy phishing marketing campaign has emerged concentrating on job seekers by means of faux Google profession recruitment alternatives, leveraging social engineering ways to reap Gmail credentials and private info.

The malicious operation exploits the belief related to Google’s model fame, crafting convincing recruitment emails that direct victims to fraudulent login portals designed to seize authentication particulars.

The assault vector primarily depends on email-based social engineering, the place cybercriminals impersonate Google HR representatives providing profitable profession alternatives.

These misleading messages comprise rigorously crafted job descriptions and utility processes that seem reliable, full with official-looking branding {and professional} communication types that mirror real Google recruitment correspondence.

Cyber researcher g0njxa recognized this marketing campaign whereas investigating broader patterns of credential theft operations concentrating on main know-how firms.

The abuse of EV cert is just not solely a Home windows challenge, though is much less traditional, can be current on MacOS malwareI recognized new signed DMG, utterly FUD on VT, from the identical supply than the quoted one which I recognized earlier than, with a brand new Developer ID “THOMAS BOULAY DUVAL”… pic.twitter.com/51kDGwe4W8— Who stated what? (@g0njxa) September 30, 2025

The researcher’s evaluation revealed that the risk actors make use of a number of assault variations, adapting their methods to evade detection whereas sustaining excessive success charges in opposition to unsuspecting victims.

Certificates Abuse and Evasion Methods

The malware marketing campaign demonstrates refined evasion capabilities by means of the abuse of Prolonged Validation certificates throughout a number of platforms.

Menace actors have obtained reliable Apple Developer ID certificates beneath names corresponding to “THOMAS BOULAY DUVAL” and “Alina Balaban,” enabling their malicious purposes to bypass preliminary safety screening mechanisms.

The signed DMG recordsdata seem utterly undetected on VirusTotal, attaining full undetected standing throughout safety distributors.

Evaluation of the malicious launchers reveals deliberate makes an attempt to legitimize purposes by incorporating signer names into identifier strings, following patterns like “thomas.parfums” akin to “Thomas Boulay Duval.”

The Mach-O binaries comprise embedded references that connect with distant AppleScript payloads, using the Odyssey Stealer framework for credential harvesting operations.

The marketing campaign’s infrastructure consists of compromised domains corresponding to franceparfumes[.]org internet hosting malicious scripts, with command and management servers working from IP deal with 185.93.89.62.

These certificates signify important monetary investments for cybercriminals, as Apple’s developer certification course of entails substantial time and financial prices, making their eventual revocation impactful to ongoing malware operations.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.


Cyber Security News Tags:Careers, Details, Gmail, Google, Hackers, Login, Posing, Recruiter, Steal

Post navigation

Previous Post: Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability
Next Post: New Chinese Nexus APT Hackers Attacking Organizations to Deliver NET-STAR Malware Suite

Related Posts

Securing Cloud Infrastructure – AWS, Azure, and GCP Best Practices Cyber Security News
New Maranhão Stealer Via Pirated Software Leveraging Cloud-Hosted Platforms to Steal Login Credentials Cyber Security News
Lenovo IdeaCentre and Yoga Laptop BIOS Vulnerabilities Execute Arbitrary Code Cyber Security News
Microsoft Office.com Suffers Major Outage, Investigation Underway Cyber Security News
Top 10 Best Digital Risk Protection (DRP) Platforms in 2025 Cyber Security News
Identity and Access Management Trends Shaping 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News