radar

ONE Sentinel

securitySecurity/THREATS/HIGH

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

sourceThe Hacker News
calendar_todayMarch 24, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

Phishing Campaign Targets Enterprises with Fake Resumes to Deploy Crypto Miners

Summary

An ongoing phishing campaign is targeting French-speaking corporate environments using fake resumes to deploy cryptocurrency miners and steal information. The attack involves the use of obfuscated VBScript files disguised as resume documents, delivered through phishing emails.

Key Points

  • The campaign targets French-speaking corporate environments.
  • Attackers use fake resumes to deliver malicious VBScript files.
  • The VBScript files are highly obfuscated to avoid detection.
  • The attack results in the deployment of cryptocurrency miners and information stealers.
  • The campaign is delivered through phishing emails.
  • Research and analysis were conducted by Securonix researchers Shikha Sangwan, Akshay Gaikwad, and Aaron Beardslee.

Analysis

This phishing campaign highlights the evolving tactics of cybercriminals who are leveraging social engineering to infiltrate corporate environments. By disguising malicious scripts as resumes, attackers exploit the common business practice of reviewing job applications, thereby increasing the likelihood of successful infiltration. The use of obfuscated VBScript files indicates a sophisticated approach aimed at evading traditional security measures.

Conclusion

IT professionals should enhance email filtering and employee training to recognize phishing attempts, especially those involving common business documents like resumes. Implementing advanced threat detection solutions that can identify obfuscated scripts is also recommended.