HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

Phishing Campaign Impersonating Coca‑Cola and Ferrari Harvests Google Workspace Credentials via MFA‑Bypassing Fake Sign‑In Pages

Threat actors are leveraging high‑profile brand impersonation to lure job seekers into a fake scheduling flow that captures Google Workspace passwords and defeats two‑factor authentication. Organizations using Google services should tighten verification processes and enforce hardware‑based MFA.

🛡️ LiveThreat™ Intelligence · 📅 April 04, 2026· 📰 malwarebytes.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
4 recommended
📰
Source
malwarebytes.com

Phishing Campaign Impersonating Coca‑Cola and Ferrari Harvests Google Workspace Credentials via MFA‑Bypassing Fake Sign‑In Pages

What Happened — Threat actors are running sophisticated phishing operations that masquerade as job‑offer recruiters from Coca‑Cola and Ferrari. Victims are lured to a fake Calendly‑style booking page, then to a counterfeit Google sign‑in window that not only captures passwords but also dynamically serves two‑factor authentication prompts, effectively bypassing MFA.

Why It Matters for TPRM

  • Credential theft from Google Workspace can give attackers lateral movement into a vendor’s cloud environment.
  • MFA‑bypass techniques raise the success rate of credential‑based attacks, expanding the attack surface of any third‑party that relies on Google services.
  • The use of high‑profile brand impersonation increases the likelihood of successful compromise across multiple industries.

Who Is Affected — Enterprises that use Google Workspace (IAM), recruiting firms, staffing agencies, and any organization whose employees receive unsolicited “job offer” emails.

Recommended Actions

  • Verify all unsolicited recruiter links through out‑of‑band communication.
  • Enforce security keys or hardware‑based MFA for Google accounts.
  • Deploy anti‑phishing training that includes brand‑impersonation scenarios.
  • Monitor for anomalous sign‑in activity from unknown IP ranges.

Technical Notes — Attack vector: phishing via malicious scheduling links → fake Google sign‑in page → credential capture and real‑time MFA prompt generation. No known CVE; the threat relies on social engineering and custom phishing kits. Data types at risk: Google Workspace credentials, email content, internal contacts. Source: Malwarebytes Labs

📰 Original Source
https://www.malwarebytes.com/blog/threat-intel/2026/04/that-dream-job-offer-from-coca-cola-or-ferrari-its-a-trap-for-your-passwords

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.