Monster.com had the personal details of some subscribers to its online portal compromised a few years ago. Now the target is on eFinancial. It seems that hackers know a lot of financial stagg will be out of work after the credit crunch and have stoop so low as to wipe out whatever little or substantial savings they are left with:
"Dear Valued eFinancialCareers Member,
You may have received a fraudulent email sent out purportedly from eFinancialCareers.com or from someone claiming to have received your information from eFinancialCareers. These emails were made to appear as if they had been sent by, or on behalf of, our service. These emails were not from eFinancialCareers.com, nor does the information in these emails have any relevance to our service.
These emails may contain statements like the following: "Part-time position (eFinancialCarrers)"; "Response to your CV at eFinancialCarrers"; "Your salary will depend on amount of paypal transfers you'll get (you will get 8% from each transaction)."; "Our client will pay to your paypal account, you will receive payments, withdraw payments, then you will forward payment to our company via Western Union".
We advise against responding to any emails of this type in any manner and against following any instructions in any of the emails.
Once we were alerted to these emails, we launched an investigation and determined that eFinancialCareers.com was the target of a sophisticated hacker attack. While not all members were impacted, the hackers obtained limited information from some job applications including: name, email address, location, phone number and any text entered into the cover letter field. The hackers did not obtain any resume files. We believe their intention was to use this data for an e-mail phishing scam similar to scams perpetrated on other recognized job boards.
We constantly review and improve security features on eFinancialCareers and we have taken immediate corrective action to protect against future attacks such as this. However, sophisticated hack attacks do happen to even the most secure websites. We will continue to increase security measures designed to withstand the latest hacking techniques"
Powered by ScribeFire.