The seek for a brand new job, particularly with a gradual labour market within the US, has change into the proper alternative for scammers to lure unsuspecting customers. A brand new report from cybersecurity analysis agency Elegant Safety, launched on October 16, 2025, reveals one more widespread credential phishing marketing campaign the place scammers attempt to get your login data, particularly by stealing victims’ Fb login particulars.
In response to Elegant’s weblog publish, shared with Hackread.com, targets are lured with pretend job postings, primarily for Social Media Supervisor roles. To extend their possibilities of success, the scammers exploit customers’ belief in well-known, respected manufacturers, together with KFC, Ferrari, and Purple Bull.
Report writer Bryan Campbell famous that the methodology remained the identical throughout all emails, which suggests the scammers used a template or an LLM (Massive Language Mannequin) to shortly launch a different wave of assaults.
An LLM is actually a sensible laptop program that may generate human-like textual content, permitting scammers to create many alternative, convincing messages sooner. On this rip-off, the emails often come from trusted companies like Google Workspace and Microsoft 365.
How the Lure Works
When the recipient of the lure electronic mail, reminiscent of a message pretending to be from Purple Bull, clicks the job hyperlink, it shortly takes the person to a pretend safety examine with a picture problem. The sufferer is then directed to a pretend job commercial on a web site designed to appear like Glassdoor. The person is prompted to use, which calls for they log in utilizing both their electronic mail or Fb account.
After a failed try to log in with electronic mail, the sufferer is offered with a pretend Fb login display. After handing over their login particulars, the sufferer is solely proven a loading bar that by no means reaches 100%, giving the scammers the credentials whereas the person waits in useless.
Recognizing the Rip-off
Elegant Safety researchers famous clear warning indicators, reminiscent of a misleading URL, like [email protected]. This hyperlink is designed to seem as if it results in Purple Bull’s web site, however truly redirects to a separate rebrand.ly tackle.
Furthermore, the scammers rely closely on Model impersonation as the e-mail options the corporate’s brand and names like “Alexa from Purple Bull Expertise.” Nonetheless, when noticed carefully, there’s a clear mismatch; the sender electronic mail tackle and the reply-to tackle don’t align with the model’s precise web site (redbull.com). Campbell explains that such scams are efficient as a result of they “supply alternatives too attractive to cross up.”
A part of a Bigger Risk
As we all know it, hackers are constantly utilizing the job market to trick individuals. This Fb-focused marketing campaign will not be an remoted incident. On October 14, 2025, Elegant uncovered an an identical kind of rip-off, additionally reported by Hackread.com.
The assault impersonated outreach from Google Careers to steal login particulars from customers. The fast follow-up to focus on Fb credentials reveals how quickly these criminals modify their techniques.







