Cleverly disguised “Job Application” email downloads a Malicious payload

Google and Facebook accused of secretly tracking users’ locations – Oh Really!
ALERT – ANZ impersonated in phishing e-mail scam
Show all

Cleverly disguised “Job Application” email downloads a Malicious payload


Don’t be fooled if your receive an email masquerading as a job application. The email contains a fraudulent resume that can infect your computer.

Targeting HR professionals, the email comes from a large number of different compromised email accounts, with unique sender names and a variety of subject lines, making it difficult to spot. 


This is a large-scale run of scam emails, which MailGuard has been intercepting over the past week and a half.

The body of the email is simple, informing recipients that the sender is interested in applying for a job vacancy, or more specifically that they are ‘interested in a position.’ It also includes a password-protected resume and contains a password to access the resume. 


Unsuspecting recipients who attempt to access the resume by entering the password end up initiating the download of a malicious payload.




The large number of different sender names and different subject lines, makes this scam a challenge for anyone that is currently recruiting, or reviewing resumes.

Here are a few examples of the various subject lines cybercriminals have used for this email scam:

  • Application
  • Job Application
  • Regarding Job
  • Job
  • Hiring
  • Regarding position

What to look out for

Some tell-tale signs to look out for include:

  • The use of a password to trigger the download of the malicious payload. This makes it harder for email filtering services to access the payload directly. Hence, it is less likely that the email will be classified as a scam.
  • Recipients should also look for job application emails that are not specific about the nature of the desired role, simply stating that the applicant has attached their resume and is ‘interested in a position.’

The above email scam is a great example of how cybercriminals can leverage routine business correspondence to trick unsuspecting recipients. Even if a potential victim doesn’t recognise the sender details, they might conceivably download the file to satisfy their curiosity.

For tips on how to protect your business from SPAM and Viruses please contact the team at QBT.