Coca-Cola Ferrari Job Scam Steals Passwords

You're scrolling LinkedIn, desperate for work in this brutal market, and bam—a Ferrari recruiter wants to chat. Don't click. It's stealing your passwords, MFA and all.

Screenshot of fake Coca-Cola Calendly page leading to simulated Google Chrome login window

Key Takeaways

  • Sophisticated phishing kits now bypass MFA by relaying real-time challenges from victims.
  • Job scams exploit 2025's 4.5% unemployment, impersonating brands like Coca-Cola and Ferrari.
  • Always verify unsolicited offers; use hardware MFA keys to block these attacks.

Imagine this: you’ve been ghosted by recruiters for months, bills piling up, and suddenly Coca-Cola emails about your ‘dream role.’ Heart races. You book the call. Boom—your Google workspace account is theirs.

That’s the nightmare hitting job seekers right now. Not some abstract cyber threat. Real people—laid-off engineers, marketing pros, anyone scraping by in 2025’s job drought—losing access to email, docs, everything tied to their work Google login.

And it’s not sloppy spam. These Coca-Cola job scams and Ferrari fakes use code that dances around two-factor authentication like a pro thief picking a high-tech lock.

Why Is No One Ready for These Job Scams?

Look, unemployment’s at 4.5%, highest in four years. Over a million jobs gone since the pandemic echo. Scammers smell blood.

They craft perfect lures: Calendly links from ‘Tricia Guyer’ at Coca-Cola, promising interviews for roles you didn’t even apply for. (Red flag one: real recruiters don’t cold-DM scheduling links.) You fill basic info—name, email, dream job type—and it feels legit.

Then the trap snaps. “Continue with Google,” it says. A fake Chrome window pops up. URL bar screams https://accounts.google.com. Buttons to close, minimize. It’s a pixel-perfect illusion, drawn right into the page—no real popup.

But here’s the killer part, the architectural shift no one’s talking about enough. This isn’t your grandma’s phishing kit.

How Does the Fake Google Login Fool MFA?

Source code spills the beans. After you punch in email and password, the page pings the attacker’s server every three seconds. Credentials shoot to their backend.

Attacker tests them live against real Google. Google demands MFA? Server whispers back the type—SMS, app code, email link. Page swaps to match, fooling you into typing your code.

It’s real-time phishing, a relay attack. Victim becomes unwilling proxy. Your phone buzzes; you verify. Attacker sails in.

“Employment scams are making a big comeback.” — Melanie McGovern, Better Business Bureau

Ferrari’s version? Same playbook, different luxury badge. Unsolicited offers for high-octane gigs, same fake browser sleight-of-hand.

My unique take: this mirrors the early 2010s credential stuffing boom, but weaponized for the MFA era. Back then, breaches fed bots guessing passwords. Now? Live human bait in job desperation. Predict this: by summer, we’ll see enterprise Google logins dumped on dark web forums, labeled ‘fresh from layoffs.’ Companies, wake up—your ex-employees are your weakest link.

The Perfect Storm Fueling This Mess

Labor market’s a dumpster fire. 1.17 million layoffs in 2025. Long-term jobless up 322,000.

Heather Long nailed it to CNBC:

“It’s likely to be a tough spring for job seekers.”

FTC logs $501 million lost to job scams in 2024, triple 2020. Phishing kits evolved—open-source evil, sold cheap on Telegram.

Scammers don’t blast billions. They target LinkedIn sprayers, Indeed posters. Precision despair.

And corporate PR? Silent. Coke, Ferrari won’t admit fans are getting owned via their brand. It’s PR poison.

But wait—why Google Workspace? Job hunters link personal searches to work email. One breach, attackers pivot: read resumes, phish contacts, steal IP.

Three words: supply chain hell.

Spotting These Traps Before They Spring

Unsolicited scheduler? Trash it.

No prior app or chat? Ghost.

Hover links—Calendly.coke-phish[.]ru? Nope.

Check sender domain. Coke uses @coca-colacompany.com, not gmail.

Enable hardware keys for MFA. SMS, apps? Still phishable this way.

Report to FTC, BBB. Starve the scammers’ data.

This kit’s backend? Traced to Russian forums. But copycats everywhere. Expect Walmart, Amazon variants soon.

Job sites, tighten up. LinkedIn, flag cold interview links.


🧬 Related Insights

Frequently Asked Questions

What is the Coca-Cola job phishing scam?

Fake recruiter emails with Calendly links leading to credential theft via fake Google login that bypasses MFA.

How do Ferrari job scams steal passwords?

Same as Coke: simulated Chrome window relays your inputs and 2FA codes to attackers in real time.

Will job market desperation make phishing worse?

Yes—FTC losses already tripled since 2020. Expect more brand impersonations as layoffs drag on.

Priya Sundaram
Written by

Hardware and infrastructure reporter. Tracks GPU wars, chip design, and the compute economy.

Frequently asked questions

What is the Coca-Cola job phishing scam?
Fake recruiter emails with Calendly links leading to credential theft via fake Google login that bypasses MFA.
How do Ferrari job scams steal passwords?
Same as Coke: simulated Chrome window relays your inputs and 2FA codes to attackers in real time.
Will job market desperation make phishing worse?
Yes—FTC losses already tripled since 2020. Expect more brand impersonations as layoffs drag on.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by Malwarebytes Labs

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.