The Latest 7 Sleazy Ways Job Scams Steal Passwords
Description
Here are some basics to apply to any and all attempts to get your financial and personal information:
* Never give your passwords to anyone.
* Use a password manager
* Use MFA (Multi-Factor Authentication) IN all circumstances
* Be a critical thinker (more in the video)
1. Fake Job Application Portals
* How it works: They send you a link to a professional-looking career site or “secure application form” that mimics a real company’s job portal.
* Goal: You’re prompted to “log in” using an email and password — and if you reuse that password for your bank or PayPal, they’ve got a direct entry point.
* Clues: URL slightly misspelled, odd subdomains (careers-companyname.xyz), or the page doesn’t exist on the company’s real site.
2. Malicious Attachments
* How it works: You’re sent a PDF or Word document labeled “Job Application,” “Offer Letter,” or “Job Description” containing malware.
* Goal: Once opened, the malware records your keystrokes, captures passwords, or installs a remote access tool.
* Clues: The file asks you to “Enable Macros” or “Allow Content,” which can execute hidden malicious code.
3. Phishing Emails
* How it works: A fake recruiter or HR manager needs you to “verify your account” before an interview. The link leads to a fake login page for your email, bank, or payment processor.
* Goal: Steal your credentials directly.
* Clues: Urgent tone (“Only filling five positions!”), generic greetings, mismatched email addresses.
4. “Direct Deposit Setup” Scams
* How it works: After a fake job offer, they send you forms to set up payroll and benefits. They ask for online banking credentials “to verify your account.”
* Goal: Access your financial accounts under the pretense of setting up payment.
* Clues: Legitimate employers never need your online banking login — only routing and account numbers for deposits.
5. Fake Background Check or Credit Report Links
* How it works: They claim the job requires a background check you must pay for online, using a link to a “screening partner.”
* Goal: Capture your credit card logins, bank credentials, or whole SSN.
* Clues: They insist you use their provided link, not a known vendor like Checkr, Sterling, or HireRight.
6. “Work From Home Equipment” Purchase Requests
* How it works: They promise reimbursement for buying laptops or software, but you must log into a “company payment system” to receive the funds.
* Goal: Get your login credentials for PayPal, Zelle, or your bank.
* Clues: Legit companies either ship equipment or use established vendors — not login-gated reimbursement portals.
7. Social Media DMs With Job Offers
* How it works: They message you on LinkedIn or WhatsApp about an “exclusive remote job” with high pay, then push you to complete onboarding via a suspicious website.
* Goal: Trick you into creating an account with credentials you often reuse for other services.
* Clues: Profile has limited work history, a recent creation date, or no mutual connections.
This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit markanthonydyson.substack.com/subscribe