Skip to content
  • search.more.net
  • Missouri OER Hub
  • Support
  • MyMOREnet
MOREnet logo
  • Solutions
    • Connectivity
      • Internet Connection
        • Network Tools
          • Bandwidth Comparison Simulator
          • Bandwidth Download Simulator
          • Backbone Usage Map
          • Router Looking Glass
        • Service Notifications
      • DNS Hosting
      • DNS Registration
      • E-Rate
        • E-Rate Support Material
          • E-Rate Training Schedule
          • E-Rate Training Videos
          • E-Rate Documents and Statistics
      • Internet2
      • WAN Connectivity
    • Security and Data Privacy
      • MSIP 6 Standards
      • Connection Security
        • Firewall
        • Akamai Secure Internet Access
      • Employee and End-User Security and Education
        • Infosec IQ
        • Keeper
          • Keeper Security and Vault Transfer FAQs
      • Network Security
        • Virtual Servers
        • Content Filtering
          • Fortinet
          • Akamai Secure Internet Access
        • Cybersecurity Assessment
        • Endpoint Detection and Response
          • Thirtyseven4
          • ThreatDown Powered by Malwarebytes
      • Data Privacy
        • Student Privacy
          • Missouri Student Privacy Alliance
          • The Education Cooperative (TEC) Data Privacy Agreement (DPA) Service
        • Privacy Best Practices
    • Network Solutions
      • Regional Support
      • LAN Services
        • Managed Networking
        • Threat Management Solution (powered by Fortinet)
        • Network Assessments
        • Network Consulting
      • Backup and Archiving
        • Network Backup
        • SecondWeb
      • Virtual Servers
      • Website Services
        • Web Hosting
      • Wireless
        • Aruba
        • eduroam
        • Wireless Surveys
    • Classroom Tools and Resources
      • Online Resources
        • Included Online Resources with MSP
        • For Fee Online Resources
      • K-20 Interoperable Data Solution (KIDS)
        • MOREnet KIDS
        • KIDS Ed-Fi
      • Missouri OER Hub
    • Collaboration
      • Video Resources
        • Managed Video Classroom
      • Discussion Lists
      • Microsoft Licensing
    • Consortium Discounts
  • Community
    • Community
    • Professional Development
      • Training Schedule
        • On-Demand Training
      • Artificial Intelligence
      • The MILL
      • Computer Science Standards
        • Computer Science Training
      • Getting Started With Tech
      • Course Information
        • In-services
        • Trainer Profiles
        • Graduate Credit
        • Contracted Training
      • Subscribe to our Newsletter
    • Events
      • Annual Conference
      • Technical Training Summit
      • Columbia Sleeping Room Rates for In-person Training
    • Missouri Cybersecurity Challenge
      • Missouri Cybersecurity Challenge – FAQ
    • Collaborations
      • Esports
      • eduroam
      • K12TechPro
      • Public-Private Partnerships
        • Research and Education Networks
  • Membership
    • Membership
      • MyMOREnet
    • K-12 Public and Private
    • Public Library
      • REAL Program Goals
      • REAL Policies
        • REAL Membership
        • Connectivity
          • Connection Upgrade Process
          • Wireless Access at REAL Program Libraries
        • REAL E-Rate Requirements
    • Higher Education
      • Missouri Higher Education Information Technology (MoHEIT)
    • Nonprofit and Agency
    • Affiliates
  • Blog
Home ▸ Blog ▸ Part-Time Job Application Scam: Prevention and Response Planning

Part-Time Job Application Scam: Prevention and Response Planning

Spot What's Wrong

This year various flavors of a “part time job application” Google forms phishing scam have circulated the education environment.  Based on reports from organizations where the scam occurred, the scam operates as follows: 

Threat actors obtain credentials for one student account, where only single-factor authentication is in place.  The account is accessed and utilized to send out a large number of email messages to school contacts, including many students as well as staff.  The email messages contain a link, which leads to a “job application” form asking for information such as cell phone, address, type of credit card and more. 

Reports of compromised accounts include that the student may have been approached via social media messaging, or the student does not know how their credentials were compromised. Student account compromise can occur, even if the institution does not allow external email messaging to student accounts. For those recipients of the Google form who add their personal information, reports include receiving potentially aggressive text messages asking for additional information. 

Considerations for Prevention

Enable Context-Aware Security

Enable context-aware security to limit account use to US-based locations, only.  Though this may not prevent the scam, it can help add a layer of protection. 

Training Students

Students should be made aware of the following:

  • Phishing, Smishing, and Vishing 
  • Never giving user ID or password information to anyone 
  • Reporting suspicious or threatening online activity 
  • Awareness of the possibility for internal account compromise 
  • Consider utilizing phishing email scenarios with students. For example, Incident IQ includes free licenses for all students when the district purchases staff licenses 

Ongoing Staff Training

  • Business email compromise, including student account compromise 
  • Reporting suspicious email activity 

Multi-Factor Authentication for Student Accounts

Consider options for single sign-on that offer an MFA option that does not require SMS. 

Response Planning

Planning and practice help minimize the impact of an account compromise incident. Here are proactive measures to assist with incident response:

Create an Account Compromise Playbook

Include draft communication for notifying families, students, and staff 

Conduct a Hand’s-On Tabletop Exercise

Send an email with a link to a Google form to people who are aware of the tabletop, and have some of them click the link and fill out the form. Then practice the following:  

  • Document all tabletop actions and findings 
  • Suspend the account 
  • Revoke sign-in cookies 
  • Check for unexpected OAuth applications with authorized access and practice revoking OAuth  access 
  • Verify when the account was successfully signed into 
  • Determine which IP address(es) signed into the account 
  • Determine if those IP addresses are suspicious or expected 
  • Determine who clicked the link 
  • Use IP verification to determine whether or not those who click have had their account signed into 
  • Check for Google Takeout events 
  • Check for export of Contacts 
  • Verify if Bookmarks were exported 
  • Determine if Passwords were accessed 
  • Check critical third party software where the password is stored in the user’s Google passwords, for user’s activity. 

Now is an excellent time to assess security measures for student accounts, to prevent these types of scams.

Blog, Employee and End-User Security and Education, Security and Data Privacyaccount compromise, Google scam

Post navigation

Earn Graduate Credit from the University of Central Missouri by Attending the MOREnet Conference

Author

Sonia Kesselring

Published

December 17, 2025

Subscribe to our Blog

Want to receive notifications when we post new blog entries? Sign up here!

Subscribe

About us

  • MOREnet History
  • MOREnet Leadership
  • The MOREnet Network
  • Research

Resources

  • Employment Opportunities
  • Backbone Usage Map
  • Questions or Comments?
  • Publications

Policies

  • Service Policies
  • Terms and Conditions
  • Payment Policy
  • Membership Pricing Information

Connect with us

  • Contact Us
  • Locate Us
  • X (Twitter)
  • LinkedIn
  • Facebook

Subscribe to Our Newsletter

Sign up for our monthly newsletter about professional development opportunities and resources for educators.

Subscribe

Copyright © Curators of the University of Missouri. All rights reserved. Copyright, DMCA, privacy information
Proudly powered by WordPress | Education Hub by WEN Themes