Original Release Date: 3/10/2023
On March 6, the NJCCIC was notified of an advanced phishing attack regarding unemployment benefits. In this scheme, the victim was contacted by a series of email messages originating from support[@]dol[.]gov[.]njdol[.]us, a fraudulent email address meant to impersonate the New Jersey Department of Labor. The associated domain dol[.]gov[.]njdol[.]us redirects the user to the New Jersey Department of Labor’s official website to feign legitimacy; the fraudulent site has since been taken down. Prior to the initial email contact, the threat actor obtained personally identifiable information (PII) of the victim through unknown means, though the victim’s email address was confirmed via haveibeenpwned.com to have been associated with a data breach.
The PII provided in the email included the claimant’s name, date of birth, zip code, and the last four digits of their Social Security number. Once contact was made with the victim, the threat actors convinced them to send images of the front and back of their driver's license and requested multi-factor authentication (MFA) codes for the following online banking accounts: Capitol One Bank, Huntington Bank, and Citizens Bank. The victim provided the threat actor with the MFA code associated with their Citizens Bank account; however, the code expired before the threat actor was able to utilize it.
The NJCCIC reminds users to exercise caution with unexpected emails from unverified senders including those claiming to be from government organization but whose email address does not use the .gov top-level domain. If a user is unsure of a message’s legitimacy, navigate to the associated organization’s official website to find the correct contact information. The NJCCIC also reminds users that legitimate email support will never ask users for MFA codes and that MFA codes should never be shared. More information on how threat actors can trick victims into obtaining MFA codes can be found in the NJCCIC article . Users are advised to use a resource such as haveibeenpwned.com to maintain awareness of recent data breaches and determine what data was exposed, resetting credentials as needed. Additionally, avoid password reuse, maintain unique passwords for each online account, and enable MFA, choosing authentication apps and biometrics over SMS text-based codes where available.