The hidden cyberthreat: what recruiters must know about social engineering risks
Marsh Commercial • August 6, 2025

In the recruitment industry, trust and confidentiality are the cornerstones of your daily operations. Handling sensitive data - such as CVs, ID documents and banking details - requires vigilance. Unfortunately, cybercriminals are increasingly targeting recruitment agencies, exploiting human vulnerabilities through social engineering tactics.




The rise of social engineering attacks

In 2024, reports indicate a significant surge in phishing and social engineering incidents, with 42% of organisations experiencing such breaches, according to the World Economic Forum’s Cybersecurity Report.[1] Unlike traditional hacking, these scams don’t rely on complex code; instead, they manipulate human behaviour—exploiting urgency, familiarity, and a willingness to help. This makes them particularly difficult to detect in real time.


Why your agency may be a prime target

Recruitment agencies process large volumes of personal data and financial transactions regularly—from payroll to contractor payments. This combination makes your business an attractive and vulnerable target for fraudsters eager to intercept sensitive information or divert funds.


Real-world example

At Marsh Commercial, we frequently encounter these threats, often with devastating consequences. One case involved fraudsters posing as a reputable company, claiming they needed contract staff for a UK market launch. Everything appeared legitimate—interviews, contracts, references—but it was a scam, resulting in substantial financial loss.


Key lessons and preventative measures

  • Exploiting authority and urgency: Scammers often leverage the credibility of well-known brands and create pressure to rush decisions.
  • Remote-only communication: No physical meetings or video calls are arranged, raising suspicion.
  • Recently registered domains: Fake email addresses may mimic authentic brands but are newly created.
  • Fake documentation: Scammers use forged identities and documents that pass basic checks.


Common tactics to watch out for

  • Impersonation of clients or candidates via email to alter bank details.
  • Spoofed messages from directors or colleagues requesting urgent fund transfers.
  • Interception of communication to reroute payments to fraudulent accounts.
  • Cold calls with urgent requests or simple resolutions.

Often, these scams go unnoticed until funds are lost—sometimes days later—making recovery difficult.


Red flags and how to spot a social engineering attempt

Stay vigilant for warning signs such as:

  • Sudden urgency to process payments or onboard candidates.
  • Unusual communication channels (e.g., switching from email to WhatsApp).
  • Lack of in-person or video contact.
  • Requests to change bank details unexpectedly.
  • Recently created or suspicious websites.
  • Discrepancies in company credentials or registration details.


Use tools like Sendmarc, Whois Lookup, ScamAdviser, or Companies House to vet suspicious domains or registrations. Look for incorporation dates, director links to other shell companies, and discrepancies in company credentials.


Practical steps for due diligence and risk management

  • Verify the digital identity and domain of new clients.
  • Conduct video calls and ID checks, especially for high-value transactions.
  • Utilise third-party platforms such as Trulioo, Entrust, or Thirdfort for background and KYC checks.
  • Consider escrow services or advance payments before committing to payroll or other financial exposures.
  • Train your team using real case studies—phishing isn’t the only threat anymore.

Implement Governance, Risk Management, and Compliance (GRC) protocols, even if your agency is small. Regular red-flag reviews and a designated risk team can prevent catastrophic losses.



Review your insurance cover

Despite best practices, scams can still succeed and can be difficult to stop. It’s crucial to review your cyber insurance policy. Many recruiters assume their cyber insurance protects them from all cyber-related losses, but that’s often not the case.

Here’s what to specifically look for in your policy:

  • Social engineering cover: Protection against losses from deception or impersonation.
  • Crime insurance: Coverage for internal and external fraud.
  • Funds transfer fraud: Protection against unauthorised or manipulated payments.


Stay vigilant and protected

The recruitment process moves fast, and cybercriminals exploit that speed and trust. Invest in team training, verify unusual requests, and consult Marsh Commercial to ensure your cyber coverage is comprehensive.

 

The TEAM Network is an Introducer Appointed Representative of Marsh Ltd and Marsh Commercial is a trading name of Marsh Ltd. Marsh Ltd is authorised and regulated by the Financial Conduct Authority for General Insurance Distribution and Credit Broking (Firm Reference No. 307511). Copyright © 2025 Marsh Ltd. Registered in England and Wales Number: 1507274, Registered office: 1 Tower Place West, Tower Place, London EC3R 5BU. All rights reserved.


 
[1] https://reports.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2025.pdf

By Simon Bliss April 30, 2026
On 7 April 2026, the Fair Work Agency (“FWA”) was established as an executive agency of the Department for Business and Trade. Its creation marks a significant shift in how worker protections are enforced, by bringing together multiple enforcement functions which were previously exercised by multiple bodies.
By Simon Bliss April 9, 2026
In Dobson v North Cumbria Integrated Care NHS Foundation Trust (the “Trust”), the Employment Tribunal considered whether the Trust’s policy of requiring all community nurses to be available to work flexibly, including at weekends, amounted to indirect sex discrimination.
New Acas Survey on the Employment Rights Act 2025
March 3, 2026
New Acas Survey on the Employment Rights Act 2025
By Andy Dunne February 4, 2026
Recruitment in 2026 doesn’t look like last year and that’s becoming impossible to ignore. This isn’t a trend report or a set of predictions. It’s a reflection of what recruitment leaders are seeing right now , through real conversations with clients, candidates, and teams.
Blog post graphic: people at a conference table, title
By TEAMNetwork January 14, 2026
In a year where many questioned the value of events, networks and face-to-face connection, the TEAMNetwork experienced something quietly remarkable.
Two people posing at the TEAMFirst event.  Title text overlays.
By Andy Dunne November 27, 2025
When I look back at my years as a solo engineering recruiter, there’s one thing I wish I’d had.
By Andy Dunne October 27, 2025
Last week Andy Dunne, TEAM’s MD, spent the day at LinkedIn’s Customer Experience Centre in London for Accelerate London.
solo recruitment event
By Andy Dunne September 23, 2025
On 18 September, 68 independent recruiters filled Marsh Commercial HQ in London for the largest TEAM Solo Division event to date.
By TEAM Network September 4, 2025
Outsourcing or Using Agency Workers? Here’s Why Mach Recruitment Ltd v Oliveira Matters
By JMW Solicitors LLP July 3, 2025
As of this week, the Employment Rights Bill has completed the committee stage in the House of Lords. It is due for report stage from 14 July 2025, which is technically the last chance to make amendments.