Latest Threat: Fake H&M Influencer Collaboration Scam
May 05, 2026
A highly polished phishing campaign is currently targeting social media creators in Luxembourg and across Europe. Unlike typical scams that rely on broken English and obvious red flags, this campaign impersonates H&M PR Manager Megan with a level of professionalism that can deceive even those in the cybersecurity industry.
The attack is a multi-step social engineering play designed to feel like a legitimate career opportunity rather than a data-harvesting trap.
How to spot this phishing attack:
1. The Email Domain: The most critical giveaway is the sender's actual address, [email protected]. A global corporation like H&M will always communicate via a corporate domain (@hm.com), never a free Gmail account.
2. Vague "Selection" Process: The email claims that after the form is filled, details are sent to "USPS" to confirm delivery, which is an unusual workflow for a legitimate brand collaboration contract.
3. The "Too Good" Factor: In this specific campaign, the "PR Manager" accepts the creator’s requested payment rate immediately without any negotiation or friction.
4. Data Harvesting: The fraudulent registration form requests an extensive set of personal information, including your full shipping address, phone number, and banking or PayPal details.
If you receive a proposal that feels too easy or originates from a generic email domain, do not fill out any forms. Delete the email and verify the offer by reaching out to the brand's verified social media handles.
Full article here