{"id":11381,"date":"2025-09-25T11:49:51","date_gmt":"2025-09-25T09:49:51","guid":{"rendered":"https:\/\/www.retarus.com\/blog\/en\/wenn-der-vermeintliche-ex-mitarbeiter-zur-cyberbedrohung-wird\/"},"modified":"2025-09-29T15:52:05","modified_gmt":"2025-09-29T13:52:05","slug":"bogus-emails-from-former-employees-pose-growing-cyber-threat","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/blog\/en\/bogus-emails-from-former-employees-pose-growing-cyber-threat\/","title":{"rendered":"Bogus emails from \u201cformer employees\u201d pose growing cyber threat"},"content":{"rendered":"\n
Our email security experts have detected a rise in a sophisticated social engineering variant targeting companies, particularly their HR or payroll teams, with a scam that is difficult to detect at first glance.<\/p>\n\n\n\n
The modus operandi usually follows an identical course. Attackers use publicly accessible career networking platforms such as LinkedIn to research the details of individuals who, according to their profiles, have until recently been employed at the targeted company or have just started in a new position.<\/p>\n\n\n\n
Using a private address which appears legitimate from a technical perspective (e.g., Gmail or Yahoo), the attackers then send a message to the HR or payroll department at the person\u2019s previous employer.<\/p>\n\n\n\n
The mail generally purports that the former employee has changed their banking details and therefore requests that all open payments (e.g., salary, bonus, overtime or vacation payouts) be transferred to the new account.<\/p>\n\n\n\n
In follow-up messages, the scammers apply time pressure \u2013 typical for such attacks \u2013 or threaten the company with legal action.<\/p>\n\n\n\n
For the recipient in the company\u2019s HR or payroll department, the scenario seems entirely plausible at first glance, especially because former employees tend to use private email accounts rather than business addresses for such matters.<\/p>\n\n\n\n