Did they really think this would work? Credit: CNN Here’s an interesting, if not outright comical, story for those of you just coming back to work after a long Labor Day weekend. Scammers are pretending to be a well-known CNN anchor and offering serious cash to anyone looking to be a security commentator on air.Earlier this afternoon, Salted Hash was contacted by a trusted source who shared a screenshot of a recent text conversation a friend and fellow security professional had.The potential victim in this story did not want their name or organization referenced on the record.The person responsible for the text messages pretends to be CNN’s Wolf Blitzer, and offers security professionals $300,000 yearly to come on to “The Situation Room with Wolf Blitzer” and act as security commentators. All the victim needs to do is pay $3,000 via Western Union to get security clearance and approval. The phone number behind the random messages is in Pennsylvania, but that wasn’t what raised red flags for the potential victim in this case.It’s the fact someone posing as a journalist offered them money out of the blue for comments – something journalists don’t do. Once the messages continued, and the Western Union transfer was mentioned, our source was confident the offer was a sham. Was this a random text, or is someone targeting security professionals? It could be either one. It might even come off as a recruiter, but the Western Union requirement kills that train of thought.LinkedIn is a rich source of information, and for some consultants and security personalities landing a gig on CNN talking shop would be a big win. While one hopes a security professional wouldn’t fall for such a scam, people do strange things for the promise of a big paycheck.In this case, the potential victim had their phone number attached to LinkedIn since before 2014, so it isn’t unreasonable to think someone is using previously compromised data to build a victim pool.Salted Hash has reached out to CNN for comments and reactions, we’ll update when they respond. The full text message is below, and if you or anyone you know happens to get one, we’d like to hear from you. Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security news Mirai leveraging Aboriginal Linux to target multiple platforms Researchers say the latest Mirai builds are like the others, with one significant difference By Steve Ragan Aug 23, 2018 2 mins Malware Internet of Things Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe