{"id":24463,"date":"2025-07-31T08:36:36","date_gmt":"2025-07-31T12:36:36","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=24463"},"modified":"2025-07-31T17:12:15","modified_gmt":"2025-07-31T13:12:15","slug":"polyworking-genz-scams","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/polyworking-genz-scams\/24463\/","title":{"rendered":"The polyworking Gen Z: new victims of cybercrime"},"content":{"rendered":"<p>The stereotype of <a href=\"https:\/\/www.reddit.com\/r\/economy\/comments\/1i7a139\/gen_z_really_are_the_hardest_to_work_witheven\/\" target=\"_blank\" rel=\"nofollow noopener\">Gen Z as lazy, uncommitted employees<\/a> averse to hard work, and prone to job-hopping is quite common. But the statistics tell a different story. Nearly half of Zoomers <a href=\"https:\/\/www.hostinger.com\/tutorials\/side-hustle-statistics\" target=\"_blank\" rel=\"nofollow noopener\">juggle<\/a> multiple gigs: a full-time job, freelancing, and various side hustles. And cybercriminals have identified these polyworking young professionals as convenient targets.<\/p>\n<p>Our experts dug into this trend and uncovered some non-obvious threats. This article explores how Gen Z can navigate their multi-job lifestyles without putting their cybersecurity at risk.\n<\/p>\n<h2>More apps, more problems<\/h2>\n<p>\nThe core issue stems from the sheer number of corporate apps and accounts Gen Z has to juggle. Think about it: Zoom for one job, Slack for another, and <a href=\"https:\/\/www.kaspersky.com\/blog\/notion-backup-and-migration-guide\/52076\/\" target=\"_blank\" rel=\"noopener nofollow\">Notion<\/a> for tasks across the board. And the more applications they use, the larger the attack surface for cybercriminals. Scammers constantly send phishing emails that convincingly impersonate employers, and <a href=\"https:\/\/www.kaspersky.com\/blog\/malicious-code-in-github\/53085\/\" target=\"_blank\" rel=\"noopener nofollow\">distribute malware disguised as business software<\/a>. They can even send <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-spot-and-prevent-boss-scams\/50861\/\" target=\"_blank\" rel=\"noopener nofollow\">fake assignments, pretending to be your boss<\/a>.<\/p>\n<p>From mid-2024 to mid-2025, Kaspersky experts recorded six million attacks involving fake collaboration platforms. Most often, attackers imitated the \u201cgolden trio\u201d of corporate applications: Zoom, and Microsoft Excel and Outlook.<\/p>\n<p>Here\u2019s how it might play out: an attacker sends an email seemingly from Zoom asking you to update the app. The email contains a link that leads to a phishing site mimicking the real Zoom page. This fake site then immediately downloads a bogus application to your device. The imposter app could then steal your contacts\u2019 data or even gain access to your entire work environment \u2014 the potential scenarios are numerous.<\/p>\n<div id=\"attachment_54015\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/07\/31164750\/polyworking-genz-scams-01.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54015\" class=\"size-large wp-image-54015\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/07\/31164750\/polyworking-genz-scams-01-1024x821.png\" alt='Phishing site urging the user to install a \"Zoom update\"' width=\"1024\" height=\"821\"><\/a><p id=\"caption-attachment-54015\" class=\"wp-caption-text\">Phishing site urging the user to install a \u201cZoom update\u201d<\/p><\/div>\n<h2>How scammers are deceiving job-seeking Gen Z<\/h2>\n<p>\nIf you\u2019ve ever seen a message in a neighborhood chat like, \u201cURGENT: remote work, $60 an hour!\u201d \u2014 it\u2019s likely a scam. But these days scammers have grown much more sophisticated. They\u2019re posting what look like <em>legitimate<\/em> job openings on popular job platforms, detailing the terms so thoroughly that the positions appear genuine. In reality, even the most well-crafted job posting can turn out to be completely fake.<\/p>\n<div id=\"attachment_54014\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/07\/31164817\/polyworking-genz-scams-02.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54014\" class=\"size-large wp-image-54014\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/07\/31164817\/polyworking-genz-scams-02-1024x849.jpg\" alt=\"Fake SMM job posting\" width=\"1024\" height=\"849\"><\/a><p id=\"caption-attachment-54014\" class=\"wp-caption-text\">Fake SMM job posting<\/p><\/div>\n<p>Cybercriminals may even conduct fake interviews to make their schemes appear more convincing. One common form of extortion targets Gen Z through fake \u201cinterviews\u201d, where victims are told to log out of their personal Apple ID and access a purported \u201ccompany\u201d account. If the victim complies, the scammers activate Lost Mode, effectively bricking the applicant\u2019s iPhone. Naturally, they then demand a hefty sum to unlock it.<\/p>\n<p>Freelance opportunities also deserve a close look. The search for freelance work is often less formal than traditional job hunting: all communication happens through messaging apps, and payments might even come from a client\u2019s personal account. It\u2019s incredibly easy to imitate this casual communication style, and scammers exploit this. In a worst-case scenario, instead of landing a new gig, you could end up with a bricked phone, malware infection, compromised personal accounts, or even losing all your money to the \u201cclient\u201d.<\/p>\n<p>It\u2019s impossible to list every single red flag when you\u2019re looking for a new job, but here are the main things to watch out for.\n<\/p>\n<ul>\n<li>If someone wants something done yesterday and is promising a ton of cash for it, you\u2019re likely dealing with scammers.<\/li>\n<li><strong>Third-party payments. <\/strong>Stick to payment methods you trust.<\/li>\n<li><strong>Sign-in\/sign-out requests. <\/strong>Be extremely wary if someone asks you to sign in or out of any accounts \u2014 especially your personal Apple ID.<\/li>\n<li><strong>Paid training.<\/strong> If they\u2019re asking you to pay for training upfront with the promise of reimbursement later \u2014 simply ignore them.<\/li>\n<li><strong>Excessive personal data. <\/strong>Applying to be a dog walker, but they\u2019re asking for copies of every page of your passport? No way, Jos\u00e9.<\/li>\n<\/ul>\n<h2>Why Gen Z is being targeted, and how to fight back<\/h2>\n<p>\nSome companies have adopted <a href=\"https:\/\/www.kaspersky.com\/blog\/personal-devices-at-work\/27769\/\" target=\"_blank\" rel=\"noopener nofollow\">BYOD policies<\/a>, asking employees to use their personal tech for work. The problem is, these are often the same devices used for everything else: gaming, downloading files from the internet, and chatting with friends. Do we even need to say that downloading torrents on the laptop used for work is a dubious idea?<\/p>\n<p>Many Gen Zers also make a costly mistake when using a large number of applications: they use one password for everything. Just a single data breach (and they <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/leaks\/\" target=\"_blank\" rel=\"noopener nofollow\">happen<\/a> <em>all<\/em> the time!), and cybercriminals can gain access to all your messaging apps, calendars, email clients, and other work-specific applications. Of course, coming up with and remembering complex passwords every time is a challenge. That\u2019s why we recommend using a <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">password manager<\/a>\u00a0that can generate strong, unique passwords, and securely store them for you.<\/p>\n<p>What else you can do to avoid falling victim to cybercriminals while you\u2019re job searching?\n<\/p>\n<ul>\n<li>Boost your cybersecurity knowledge by playing <a href=\"https:\/\/case404.kaspersky.com\/en\/\" target=\"_blank\" rel=\"noopener\">Case 404<\/a>.<\/li>\n<li>Always enable <a href=\"https:\/\/www.kaspersky.com\/blog\/what_is_two_factor_authentication\/3906\/\" target=\"_blank\" rel=\"noopener nofollow\">two-factor authentication<\/a> wherever possible. By the way, you can store your 2FA tokens in <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">our password manager<\/a>.<\/li>\n<li>Avoid downloading apps or updates from suspicious websites.<\/li>\n<li>Install <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>\u00a0on your personal devices. This application can prevent you from opening phishing links, and significantly improve your personal security.<\/li>\n<\/ul>\n<blockquote><p>Cybersecurity cheat-sheet for polyworkers:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/international-password-day-2025\/53355\/\" target=\"_blank\" rel=\"noopener nofollow\">Creating an unforgettable password<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/minimizing-digital-footprints-2025\/53762\/\" target=\"_blank\" rel=\"noopener nofollow\">How to shrink your digital footprint<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/top-encrypted-todo-and-note-taking-apps\/50915\/\" target=\"_blank\" rel=\"noopener nofollow\">Keep it under wraps: encrypted note-taking apps and to-do lists<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-use-chatgpt-ai-assistants-securely-2024\/50562\/\" target=\"_blank\" rel=\"noopener nofollow\">How to use ChatGPT, Gemini, DeepSeek and other AI securely<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/what-to-do-if-someone-tries-to-hack-you\/49175\/\" target=\"_blank\" rel=\"noopener nofollow\">What to do if someone tries to hack you<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>The more jobs you juggle, the higher your exposure to personal cybersecurity risks \u2014 especially if you&#8217;re a Zoomer.<\/p>\n","protected":false},"author":2706,"featured_media":24467,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[2040,76,695,521,131,2844],"class_list":{"0":"post-24463","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-extortion","9":"tag-phishing","10":"tag-scam","11":"tag-threats","12":"tag-tips","13":"tag-zoomers"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/polyworking-genz-scams\/24463\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/polyworking-genz-scams\/29349\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/polyworking-genz-scams\/29297\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/polyworking-genz-scams\/40211\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/polyworking-genz-scams\/54010\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/polyworking-genz-scams\/29513\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/polyworking-genz-scams\/35215\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/polyworking-genz-scams\/34861\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/threats\/","name":"threats"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=24463"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24463\/revisions"}],"predecessor-version":[{"id":24469,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24463\/revisions\/24469"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/24467"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=24463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=24463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=24463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}