Fake Resumes on LinkedIn Deliver More_eggs Malware
Posing as Job Seekers on Professional Platforms
A criminal gang that security researchers know as FIN6 has begun taking advantage of the job-hunting world in a new way. According to a fresh investigation from DomainTools, the group is approaching recruiters on popular employment sites such as LinkedIn and Indeed, pretending to be ordinary applicants who are simply looking for work. Once a conversation gets going, the crooks send the recruiter a link that supposedly hosts the applicantâs rĂ©sumĂ©. The link looks harmless enoughâit even carries a convincing personal-portfolio address like bobbyweisman [.]com or ryanberardi [.]comâbut behind the scenes it leads to malware.
Renting the Cloud to Hide in Plain Sight
The trick works because the malicious sites sit on infrastructure that businesses already trust. FIN6 registers the domains with GoDaddy, then hosts them on Amazon Web Services, often through EC2 instances or S3 buckets. Both services are household names in the tech world, so web-filtering tools rarely block them. FIN6 also pays extra for GoDaddyâs privacy add-on, which hides the real ownerâs name and contact data. That small fee makes it far harder for investigators or hosting providers to shut the operation down quickly.
The attackers build in another layer of defense by filtering who can reach the dangerous download. A visitor must solve a CAPTCHA before the site serves up anything more than a blank rĂ©sumĂ© in plain text. Even then, the server quietly checks the visitorâs location and browser. If the request comes from a home IP address and a normal Windows browser, the ZIP archive is offered. If the request arrives from a corporate network, cloud host, or known VPN, the visitor sees only the benign document. This selective approach dodges automated scanners and keeps the malicious file out of threat-intelligence feeds.
The More_eggs Backdoor and What It Can Do
Hidden inside the downloaded ZIP file is a piece of code known as More_eggs, created by another underground crew, Golden Chickens (also called Venom Spider). More_eggs is written in JavaScript, which means it can run on a victimâs machine without needing special privileges. Once active, it opens a secret channel back to the attackers. Through that channel FIN6 can grab usernames and passwords, move laterally across the network, or fetch additional toolsâsometimes even ransomware.
Security experts have tied FIN6 to More_eggs going back to 2018. The gangâs older campaigns often hit hotels and retail chains that still used point-of-sale (PoS) systems for card transactions. By sneaking malware onto those PoS terminals, the criminals collected payment-card data in real time and later sold the numbers on black-market forums like JokerStash, which closed in 2021. FIN6 has also dabbled in Magecart-style skimming: inserting tiny snippets of JavaScript into online checkout pages to siphon card numbers from web shoppers. In every case the end goal is simpleâturn stolen financial details into cash.
Why the Scam Works
FIN6âs latest move shows that even a low-tech lureâsending someone a rĂ©sumĂ©âcan score big when paired with modern cloud services and clever evasion. Recruiters are trained to open candidate documents quickly, and many use personal machines or simple antivirus tools that might not catch a brand-new sample of malware. The CAPTCHA wall fuels a sense of legitimacy (âeveryone uses CAPTCHA these daysâ) while quietly filtering out sandbox environments that analysts rely on. By keeping the initial stage small and trustworthy, the attackers avoid tripping alarms until they already have a foothold.
Fallout for Victims and Defenders
Once More_eggs is embedded, the door is open for far more damaging follow-up actions. FIN6 can harvest credentials to corporate email, cloud services, or payment systems. Ransomware operators, who often partner with groups like FIN6, can then lock down a companyâs data and demand a payout. Even if no ransom is dropped, the theft of customer card data carries steep regulatory fines and reputational harm. For recruiters and HR departments, the episode serves as a reminder that the hiring workflow itself is now a soft target.
Defenders have a few angles to fight back. Blocking newly registered domains from serving executable files is one. Restricting rĂ©sumĂ© submissions to trusted cloud drivesâwhere files can be scanned in isolationâhelps too. Perhaps most important is teaching anyone who handles rĂ©sumĂ©s to treat every unexpected download link with suspicion, even if the sender appears polished and professional.
Looking Ahead
FIN6 has been active since at least 2012 and shows no sign of slowing down. By mixing ordinary social skills with rented cloud power, the group demonstrates that modern attacks do not always rely on exotic zero-day exploits. Sometimes all it takes is a believable backstory, a familiar hosting brand, and a few lines of JavaScript. As long as recruiters continue to value speed over caution, and as long as cloud services remain easy to spin up anonymously, tactics like fake rĂ©sumĂ©s delivered through AWS will likely stay in the attackerâs playbook.