When Job Opportunities Become a Trap: The Fake Recruitment Campaign by Vietnamese Hackers
Recently, a cybercriminal group tracked under the name UNC6229 launched a phishing campaign targeting Digital Marketing professionals in Vietnam.

Overview
In October 2025, Google's Threat Intelligence Group (GTIG) discovered a large-scale phishing campaign by Vietnamese hackers. They exploited fake job postings on legitimate platforms to target individuals in the digital marketing and advertising fields. The attackers used sophisticated methods to distribute malware and phishing toolkits, ultimately aiming to compromise high-value corporate accounts to hijack digital advertising accounts. GTIG has designated this campaign with the tracking code UNC6229.
Google Threat Intelligence Group stated that this campaign primarily targets remote digital advertising employees, those with contract or part-time positions, who may be actively seeking jobs. The attack begins when the victim downloads and executes malware or enters credentials into a phishing website. This inadvertently exposes all of the victim's information, and the user's machine becomes a platform for spreading malware or deploying backdoors to take over systems.

Campaign Details
As mentioned, the UNC6229 group will create fake company profiles, often posing as digital media agencies or recruitment companies in the digital advertising industry. They will post attractive positions, remote or flexible work, targeting those seeking part-time or contract jobs in digital advertising.
To build trust with victims, the attackers encourage job seekers to proactively send their information (resume, name, contact). According to one victim, "I applied proactively, so this seemed like a normal recruitment process," showing how sophisticated and psychologically adept the attackers are.

After posting fake job listings, the hackers will contact the victims and build trust with them. They will reach out via email or direct messaging, sometimes using legitimate CRM tools to send mass emails and manage campaigns. Using legitimate CRM/services helps emails bypass spam filters and makes them harder to control. In this initial step, the emails usually do not contain any malicious attachments to reduce the victim's suspicion and increase trust.

And of course, once they have gained the victim's trust, the payload will be deployed in two ways.
- Malware delivery: UNC6229 will send an attachment (usually a password-protected ZIP file) with an explanation like "skills test" or "mandatory application form." If the victim extracts and runs it, they may install a remote access trojan (RAT), allowing the attacker to easily control the victim's machine.

- Phishing link: In this method, the attacker will send links to fake recruitment websites or sites that look like interview scheduling or assessment pages. These pages are cleverly designed and can "capture" multi-factor authentication (MFA) codes from services like Okta, Microsoft, etc.

And of course, if the victim is logged into a company computer or on a personal device with access to the company's ad accounts, the attacker can exploit this to take control. Once they gain control of the ad or social media account, the attacker can:
Sell the account to other parties.
Use it to run scam ads, profiting from advertising or affiliate schemes.
Increase the risk for the attacked organization, leading to loss of reputation and financial damage.
Conclusion
This campaign has shown that attacks through "fake recruitment" are becoming increasingly sophisticated, as they exploit the real needs of job seekers and rely on the victim's trust (social engineering) rather than just technical skills.
GTIG predicts that the group UNC6229 and similar actors will "continue to refine their approach, expand their target industries (not just digital advertising), and use multiple platforms like legitimate SaaS or CRM to deceive victims. This means that organizations and individuals need to be constantly vigilant, not only when encountering "strange" job offers but also by strengthening internal controls, delegating authority, and raising awareness.
Recommendations
Separate work and personal accounts
Do not allow employees to use company accounts to log in on personal browsers or uncontrolled devices.
Require the use of company accounts through SSO (Single Sign-On) or IAM with MFA.
Limit access (Principle of Least Privilege)
Only those who truly need to manage ads should have access to Ads and Meta accounts.
Implement role-based access control (RBAC) to separate roles like “viewer,” “editor,” “admin.”
Employee awareness and training
Organize quarterly “Security Awareness” sessions, emphasizing the topic of fake recruitment phishing.
Provide real examples from the UNC6229 campaign to help employees recognize threats.
Require employees to report any suspicious recruitment emails to IT Security before opening files/links.
Be cautious with attachments and links
Do not download ZIP/RAR/PDF files from unknown sources.
Do not enter login information or MFA codes outside of official sites.
Use a secure browser (Chrome/Edge sandbox) and online virus scanning tools before opening files.
If you suspect a scam
Immediately change passwords for all related accounts.
Check login history (security activity).
Update antivirus software and scan the entire system.
IOC
Domain
staffvirtual[.]website
paxcorporation[.]com
jobs-career[.]site
careers-promo[.]xyz
File Hash
137a6e6f09cb38905ff5c4ffe4b8967a45313d93bf19e03f8abe8238d589fb42
33fc67b0daaffd81493818df4d58112def65138143cec9bd385ef164bb4ac8ab
35721350cf3810dd25e12b7ae2be3b11a4e079380bbbb8ca24689fb609929255
bc114aeaaa069e584da0a2b50c5ed6c36232a0058c9a4c2d7660e3c028359d81
e1ea0b557c3bda5c1332009628f37299766ac5886dda9aaf6bc902145c41fd10






