Cybersecurity researchers from Unit 42 have uncovered a highly targeted phishing campaign in which attackers impersonate recruiters from Palo Alto Networks. Notably, this scheme has been active since August 2025 and continues to evolve with increasing sophistication.
To begin with, threat actors carefully select senior-level professionals as their primary targets. They scrape publicly available data from platforms like LinkedIn and then use it to craft personalized and convincing outreach emails. As a result, these messages appear highly credible and relevant, making it easier for attackers to establish trust with their victims.
Initially, the attackers pose as members of the company’s talent acquisition team. They send well-structured emails that mirror legitimate corporate communication, thereby creating a sense of authenticity. Moreover, these emails often include flattering language and detailed references to the recipient’s professional background, further strengthening the illusion.
However, the real manipulation begins once the attackers introduce a fabricated obstacle. Specifically, they claim that the candidate’s CV does not meet the requirements of an Applicant Tracking System (ATS). This system, which organizations commonly use to filter resumes based on structure, formatting, and keywords, becomes a convenient excuse for the scam.
Subsequently, attackers escalate the situation by presenting this issue as urgent. They create a false sense of pressure by suggesting that the recruitment process is already underway and that immediate action is required. At this stage, they offer a paid solution, encouraging victims to reformat or optimize their resumes through a so-called “expert.”
Furthermore, the attackers often simulate a seamless recruitment workflow. After the initial contact, the “recruiter” hands over communication to another individual posing as an ATS specialist. This “expert” then provides structured pricing options and promises rapid delivery—sometimes within just a few hours—to align with the supposed review timeline.
In addition, these phishing emails incorporate convincing visual elements. Attackers frequently use legitimate company logos in email signatures, along with highly specific details extracted from the victim’s LinkedIn profile. Consequently, this combination of personalization and branding significantly increases the likelihood of success.
Importantly, this campaign demonstrates how attackers exploit both technology and human psychology. By manufacturing urgency and authority, they manipulate victims into making quick decisions without proper verification.
Therefore, organizations and professionals must remain vigilant. It is crucial to verify recruiter identities through official channels and avoid engaging with unsolicited requests that involve payments. Ultimately, awareness and caution remain the strongest defenses against such evolving social engineering attacks.
Recommended Cyber Technology News:
- WatchGuard Expands Network Threat Detection for MSPs & SMEs
- Lumu Launches Agentic SOC for Autonomous Security Operations
- Cloud Phones Linked to Growing Financial Fraud Risks
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com
🔒 Login or Register to continue reading

