Fraud Management & Cybercrime,
Fraud Risk Management,
Governance & Risk Management
Enterprises Must Address Risks Linked to Compromised Personal Devices

Many are familiar with the deceptive texts promising lucrative job opportunities from corporate recruiters. These scams often encourage individuals to follow links and provide personal information, enticing them with the prospect of a career advancement.
Related Reading: Mastercard on Agentic Payments: How AI, Tokenization, and Authentication Will Redefine Digital Commerce
Such online job scams have ensnared thousands, resulting in credential theft, fraud, and breaches. However, their impact has escalated from a mere nuisance for individuals to a tangible threat to corporate networks, intensifying risks for Chief Information Security Officers (CISOs).
A recent advisory from Google highlights that scammers are embedding remote access Trojans and information-stealers disguised as legitimate recruitment software, aimed at infiltrating both personal devices and corporate systems.
According to Google researchers, “Victims face severe consequences, including financial theft, identity fraud, and system compromises that facilitate credential harvesting and corporate network breaches.” The Global Anti-Scam Alliance reported that in 2025, 57% of adults fell victim to online scams, with 23% incurring financial losses. For a corporation with 5,000 employees, this statistic translates to approximately 2,850 individuals potentially targeted with phishing attempts. Should even a small percentage succeed, the risk of compromise escalates significantly.
Attackers typically employ tactics that involve creating sophisticated replicas of official career pages, fake recruiter profiles on professional networks, and distributing fraudulent job postings across various channels. Data harvesting occurs through these fake applications, gathering personal and financial information that can lead to broader cybersecurity threats.
The critical juncture arises when victims unwittingly download malicious applications, which may deploy RATs that provide ongoing access, seek browser credentials, and harvest sensitive data. Once these individuals connect their personal devices to corporate networks, the potential for widespread security breaches rises.
One significant challenge for CISOs is the inadequacy of traditional security measures against this emerging threat. Standard endpoint detection tools may not monitor personal devices, and network defenses are often blind to malware on devices not yet linked to corporate infrastructure. Furthermore, the human element complicates matters, as research indicates that more than 60% of fraud victims delay reporting their experiences due to embarrassment or fear of judgment.
Even a single remote access Trojan that gains network access could lead to data breaches, with IBM estimating the average cost at approximately $4.4 million. To combat these threats, security teams must implement clear protocols for reporting incidents related to job scams, creating a culture of openness around these vulnerabilities. Expanding technical controls to encompass all devices accessing corporate resources is essential, focusing on mandatory endpoint protection and multi-factor authentication measures.
Ultimately, the distinction between personal and corporate security has diminished. Organizations must recognize that job scams are no longer relegated to the realm of human resources but represent a significant and unaddressed attack surface. A comprehensive re-evaluation of cybersecurity strategies is crucial for addressing these evolving threats effectively.