Skeleton Spider’s Cloud Tactics Expose Recruiters to Stealth Malware

FIN6 phishing campaign

FIN6 phishing campaign uses fake resumes and AWS infrastructure to deploy malware through trusted platforms like LinkedIn and Indeed.

FIN6, also known as Skeleton Spider, has evolved from targeting point-of-sale systems to deploying advanced phishing campaigns aimed at recruiters. By posing as job applicants on platforms like LinkedIn and Indeed, the group gains trust before sharing links to fake resume sites hosted on AWS infrastructure. These sites use CAPTCHA barriers and traffic filtering to evade detection, delivering ZIP files containing disguised .LNK shortcuts that execute the more_eggs backdoor. This malware-as-a-service tool enables credential theft, system access, and follow-on attacks such as ransomware. Domains like bobbyweisman[.]com and emersonkelly[.]com demonstrate the use of cloud-hosted infrastructure with behavioral checks to ensure only real users receive payloads.

Analysis by Our Experts:


The FIN6 campaign highlights how even modest phishing efforts can achieve sophisticated results when paired with modern infrastructure and well-crafted social engineering. While the abuse of platforms like Indeed and LinkedIn poses challenges, this also underscores where defenders can concentrate efforts: identity validation, behavioral traffic analysis, and improved recruiter training. The use of CAPTCHAs, fingerprinting, and resume-styled lures shows how attackers innovate with simple tools. Encouragingly, every tactic used here leaves a detectable footprint, persistence keys, cloud domains, and PowerShell misuse. With cross-team collaboration between HR and security teams, organizations can turn these tactics into high-confidence detection opportunities.

Read the full article here.

Stay informed with us!

You can subscribe to our monthly cybersecurity newsletter to receive updates about us and the industry

Blog

Check the latest updates on threats, stories, events and analysis.

G7 Evian 2026: The Cyber Risk Map and Recommendations

Copy Fail: When 732 Bytes of Python Can Root Every Linux Server You Manage

Risk & opportunity with Claude Mythos - ZENDATA

Mythos, LLMs, and the end of the security paradigm as we knew it – interview on Swiss TV RTS