The Hire the Stakes, The Greater the Fall
by Gregg Jones and Kory Underdown on Oct 23, 2025 8:00:00 AM
Another late night, exhaustion and sore eyes setting in after sending what felt like the thousandth job application on your list, when yet another reply hits your inbox with the words, “Unfortunately we…”
You don’t even need to read the rest; you’re familiar enough with how this goes. Woefully, you sit thinking about the work you’ve put into the job search: The degree, the blood, the sweat, the tears—ping.
An email notification graces your frustrated thoughts. Another rejection? Wait, this mail in your inbox is from… Large Media Company? Asking for you? By name?!
The email reads:
“Dear You, We came across your LunkedOut profile, and were very impressed with your credentials and portfolio. We’d love to invite you to apply for our position here at Large Media Company as Job Title that Definitely Exists! Please see all of our amazing benefits! Just click the link to our application platform and fill out your information. We’ll reach out soon.”
Do you fill it out?
Bait and Switch
An undeniable pattern with cyberscams: The exploitation of current events. So it only makes sense that during times of economic uncertainty and a tricky job market, predatory phishing and other malicious tactics are deployed in response.
Today’s method of exploitation? Desperation and financial hardship with some too-good-to-be-true offers. There have been recent reports that finding a new job is becoming increasingly more difficult. And with it taking an average of 180 job applications to land one job offer, it can feel pretty exciting to get an email from a “recruiter” that thinks you’re perfect for the job.
Unfortunately, many of these too-good-to-be-true offers are, at best, bait to get personal information from you and, at worst, the beginning of long and distressing string-along phishing campaigns.
How Do These Hiring Scams Work?
Job applications often require wide swathes of information from the applicant, including phone numbers, addresses, SSNs, references, personal or financial histories, and in some cases even some medical history. All of this personal identifying information (PII) is extremely valuable to bad actors. And with so many people currently in the global job market coupled with the number of applications required to receive a job offer, applicants are more likely to give their information up without thoroughly vetting every job listing.
Bad actors that are looking to capitalize on the current job market are creating websites that impersonate job boards, individual job postings, or large companies. They’re also sending targeted “recruiter” emails to unsuspecting potential job seekers in hopes that they will be interested enough in the job interview to click one of the malicious links inside. When looking at DNSFilter network data from January 2025 - October 2025, we found:
- 12,895 threat-categorized domains containing one or more of 6 hiring keywords: careers, jobs, staffing, talent, recruiting, and hiring
- 8,724 domains containing the word “jobs” that were determined to be malicious
- 88% of these malicious hiring-related domains were newly registered or newly observed domains
When you consider that 92% of the workforce is actively looking for a new job while they are at work, these malicious hiring sites become a concern for companies and individuals alike.
Protect Your Network (and Your Data)
As prevalent as these scam hiring sites and fake recruiter emails are, there are still many actions that individuals and organizations can take to protect their confidential data and prevent network breaches:
- Be wary of unsolicited job offers, emails that seem too good to be true, and any message that requires an “urgent” response.
- Always check the sender of emails from recruiters (and anyone for that matter) to make sure that their name and company match the email address they are sending from.
- Hover over links inside of emails before clicking to make sure the domain matches the site you intend to visit. Also be sure to look out for long-winded domain names with weird combinations of words or numbers, domains that have lots of hyphens, or any other site domain that feels “off” to you.
- Organizations can block newly registered and observed domains on their network to prevent potentially malicious sites from resolving, even if they are accidentally clicked.
With all of that said, if you said “yes” you’ll fill it out in the first section, we really hope the rest of this article helped to change your answer.
Ready to prevent hiring scams from ruining your day? Try DNSFilter free for 14 days now.
6 Security-Focused New Year’s Resolutions for 2026
The start of a new year is the perfect time to reset habits—not just personal ones, but digital habits too. Cybercriminals don’t need zero-days or nation-state tooling if we keep handing them easy wins through reused passwords, oversharing, and rushed reactions.
Inside Business Email Compromise Scams: How to Protect Your Business
The Scam That Outsmarts Awareness Training
It starts with a routine email.
How to choose the right DNS provider for the job
Choosing a DNS provider used to be about speed. Today, it’s about security. The Domain Name System (DNS) has evolved from a simple directory of the internet into a critical control point for visibility, compliance, and protection. The right provider can identify and block malicious activity before it ever reaches your endpoints, keeping your users safe—no matter where they connect. That’s why DNS filtering has become one of the most effective, ...


