Cybercriminals Phish For Employee Credentials Using Fake HR Bonus Payment Emails

A new phishing campaign leveraging bogus bonus payments from the HR department is targeting employees and remote workers across the globe to steal business login credentials.
This phishing attempt, caught by Bitdefender Antispam Lab earlier this week, originates from IP addresses in Russia and has spread organically to inboxes in the US, UK, Ireland, Sweden, Denmark, Sweden and Romania.
HR-related topics have become an attractive go-to recipe for successful account takeover attempts and business compromise since the beginning of the pandemic.
While previous attacks leverage internal policy changes or notifications alerting employees about password checks and security-related notifications, the ongoing campaign uses a different tactic.

Recipients are lulled into accessing a bogus word document allegedly containing information on bonus payments. It may seem like the attackers put little effort into gift-wrapping the fake email, but what better way to pique an employee’s interest and curiosity, than baiting them with potential monetary bonuses.

Threat actors have their sights set on businesses and organizations, and often use employee carelessness to compromise internal networks and cripple businesses in targeted ransomware attacks. Credential phishing puts both employers and employees at risk. The hybrid work environment and increased personal use of corporate devices add to the long list of cybersecurity mishaps provoked by employees who fall for malicious correspondence.
Coveted phished employee credentials let attackers bypass an organization’s security measures to steal critical data. Bitdefender recommends employees take extra care when reading emails, even those that apparently come from an employer, HR or IT department.
Users who receive similar emails should immediately send them to their IT department. When in doubt, it’s best to ask for assistance or details from your human resource department before accessing any links, downloading attachments, or entering your corporate login credentials onto an online form.
Note: This article is based on technical information courtesy of Bitdefender Labs
Stay Safe!
tags
Author
Right now
Top posts
John Oliver Shows the Dark Side of Data Brokerage on Last Week Tonight
April 15, 2022
Bitdefender Labs Warns of Phishing Scams Targeting MetaMask Users
April 14, 2022
Why and how to hide your IP address while traveling
April 13, 2022
How Bitdefender Can Help Restore Your Privacy in the Digital Age
April 04, 2022
How Strong is VPN Encryption?
February 28, 2022
Top Three Ways Internet Users Unknowingly Help Cybercriminals
February 25, 2022