Beware of Recruitment Scammers Impersonating CovertSwarm
Beware of individuals impersonating our company to issue fake job opportunities and associated offers.
Beware of individuals impersonating our company to issue fake job opportunities and associated offers.
[updated May 2025]
We have recently become aware of fraudulent activity involving individuals impersonating our company to issue fake job opportunities and associated offers. These scams are common and often attempt to extract personal information to steal the identity and/or financial details from unsuspecting individuals.
One example of a fraudulent communication sent to a victim read as follows:
*”Hi [Name],
Hope you are well!
As discussed on the phone, please find attached an NDA for you to sign and return via email.
In your email reply, please attach a signed NDA and provide the requested personal details.
Once we receive this information, we will email you the letter of consent and immunity prepared by the authorities.
Best regards,
[Sender Name]
[Fake Company Name]”*
In another example, scammers are using YouTube to direct the public to fake employment websites and consultancies.
If you receive a communication that seems suspicious, verify its authenticity through our official channels. For example, contact us via our main website (https://www.covertswarm.com) or email [email protected]
Online impersonation and recruitment scams are on the rise. These malicious actors often prey on individuals who are actively seeking employment or open to collaboration opportunities. By staying vigilant and following the above guidance, you can protect yourself from falling victim to these scams.
CovertSwarm remains committed to transparency and professionalism in all our interactions. If you have any concerns or suspect fraudulent activity involving our name, please don’t hesitate to contact us directly. Together, we can combat these scams and keep our community safe.
Stay safe, stay informed, and always verify.
Remote Work Security Gaps Still Driving UK Breaches
Despite years of adaptation, organizations are still being breached through remote access blind spots.
Part 1: CBEST Series – Beyond the Checklist
Explore how threat-led penetration testing helps financial institutions go beyond traditional checks to strengthen resilience and meet regulatory expectations like CBEST, STAR-FS and DORA.
EchoLeak: The Zero-Click Microsoft Copilot Exploit That Changed AI Security
AI tools like Microsoft 365 Copilot are changing how organizations work, but they are also introducing new security risks that are harder to detect and even…