As a recruiter, your work relies heavily on trust, communication, and handling sensitive data, whether that’s candidate CVs, ID documents, or client banking details. But that trust can be exploited. Recruitment agencies are vulnerable to cybercriminals targeting them. One of the most deceptive threats is social engineering, a form of attack that manipulates people into handing over confidential information or authorising fraudulent transactions.
These types of scams are on the rise. In 2024, there was a sharp increase in phishing and social engineering attacks, with 42% of organisations reporting such incidents, according to the World Economic Forum’s Cybersecurity Report.[1] This approach doesn’t require complex code. Instead, it exploits human behaviour, urgency, familiarity, and helpfulness. And that makes it much harder to recognise in real time.
Your agency handles high volumes of personal data and processes financial transactions on a regular basis. This makes your business a lucrative and vulnerable target. From payroll to contractor fees, your systems handle transactions that fraudsters are eager to intercept.
At Marsh Commercial, we regularly encounter these types of attacks, and in most cases, the aftermath is devastating. In one case, fraudsters posed as a reputable company, claiming to need contract staff for a UK market launch. Everything appeared legitimate: interviews, contracts, even references. However, it was all a sham, resulting in a substantial financial loss.
Here are some of the critical learnings and due diligence measures that can be taken from this case to help others avoid similar traps:
Exploiting urgency and authority – The scammers relied on the credibility of a big name and created time pressure.
Remote-only communication – No physical meetings or video calls were arranged.
Newly created domains – The email domain represented the authentic brand but was only recently registered.
False documentation and identities – All of which passed basic checks.
Common tactics include:
You might not realise what’s happened until the money’s gone, sometimes days later. By then, recovering it is challenging.
Being aware of the warning signs can help protect your agency. Here are some key red flags recruiters should watch out for:
Use tools like Sendmarc, Whois Lookup, ScamAdviser, or Companies House to vet suspicious domains or registrations. Look for incorporation dates, director links to other shell companies, and discrepancies in company credentials.
Here are some practical steps you can take:
Train your team using real case studies—this isn’t just about phishing anymore.
Consider implementing Governance, Risk Management, and Compliance (GRC) protocols, even if you’re a small agency. A designated internal risk team, or regular red-flag reviews of new opportunities, could prevent a catastrophic loss.
Check your insurance
Even with the best training, these scams are difficult to stop all the time. That’s why it’s vital to review your insurance cover. Many recruiters assume their cyber insurance protects them from all cyber-related losses, but that’s often not the case.
Here’s what to specifically look for in your policy:
Social engineering cover – Protection against losses caused by deception or impersonation.
Crime insurance – Covers both internal (employee) and external fraud.
Funds transfer fraud cover – Protects against unauthorised payments made in error due to manipulation.
Stay alert and stay covered
Recruitment is a fast-paced process, and cybercriminals are aware of it. They rely on that speed and trust to catch you off guard. Take the time to train your team, verify unusual requests, and contact your REC Insurance Services adviser to review your cyber insurance cover or click here to find out more.