Skip to content

Instantly share code, notes, and snippets.

@BushidoUK
Created April 4, 2025 11:39
Show Gist options
  • Save BushidoUK/e44625b0439024730f7e233bc9eeb85a to your computer and use it in GitHub Desktop.
Save BushidoUK/e44625b0439024730f7e233bc9eeb85a to your computer and use it in GitHub Desktop.
Meta recruitment themed credential phishing

Summary

  • Phishing campaign target Facebook accounts, as well as Threads and WhatsApp
  • Emails sent using a recruitment platform called recruitee.com
  • Landing pages are hosted with Cloudflare and target Facebook login credentials
  • The websites are built with Socket.io

Example phishing email and sender

  • application[@]realitylabshiring.recruitee.com
  • realitylabshiring[.]recruitee[.]com

Example Meta-themed phishing page

Pivoting on Page Attributes

image

image

Additional Domains in the Campaign

recruit.msgconnecthire.com
recruit.metaquestoccupation.com

recruit.oculusachieve.com
recruit.oculusnetworking.com
recruit.oculusproposal.com

recruit.threadsforopportunities.com
recruit.startthroughthreads.com
recruit.threadsportal.com
recruit.threadsjobsnet.com

recruit.realitylabsappoint.com
recruit.realitylabshiring.com

recruit.metacareers-projobs.com
recruit.metacareers-hr.com
hr.metacareersenroll.com

recruit.schedulewhatsapp.com
recruit.whatsappteam.com
Pivot Points via URLscan:

Similar Phishing Page for Threads

Sites made with Socket.io

image

image

OSINT

Other Recruitee Phishing Sender Domains

  • From Reddit, it was possible to discover more email sender addresses Redditors received these scam emails from:
recruitingcenteratthreads.recruitee.com 
threadsrecruiting.recruitee.com
oculusmetaquest.recruitee.com
realitylabstalenthub.recruitee.com
@BushidoUK
Copy link
Author

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment