Crypto Hackers Use Fake Job Interviews to Install Malware

Key Takeaways:

  • Crypto hackers are now using fake job interviews to spread malware.
  • Instead of suspicious files or fake software, they trick victims into “fixing” microphone and camera issues. In reality, these so-called fixes install backdoors.
  • Hackers then use these to steal cryptocurrency and personal data.

1. A Sophisticated New Scam

Hackers have moved beyond phishing emails and malicious PDFs. They now impersonate recruiters from well-known crypto companies. These fake recruiters offer jobs with dream salaries, ranging from $200,000 to $350,000.

Imagine receiving a LinkedIn message from someone claiming to work for Gemini, a major crypto exchange. They invite you to interview for a high-paying role like “Business Development Manager.” Naturally, you might feel excited and interested.

The process seems legitimate at first. You’re given written interview questions to answer in detail. Then, you’re asked to complete a video interview through a platform like “Willo | Video Interviewing.” Everything looks professional, but it’s a trap.

2. The Camera and Microphone “Fix”

When you try to access your microphone or camera for the video interview, an error message pops up. It claims there’s a cache issue and provides instructions to resolve it.

This is where the scam begins.

Taylor Monahan, a blockchain expert, warns that following these instructions can lead to disaster. The steps involve downloading a “support tool” to fix the issue. In reality, this tool installs malware on your device.

Downloading a “support tool” to fix the issue

After following these steps, you might be prompted to restart your browser, usually Chrome. This “restart” actually gives hackers access to your computer. They may also ask you to disable security features or grant access to sensitive folders. Once done, the hackers gain full control over your system.

3. Severe Consequences

The malware gives hackers a backdoor into your device. They can easily steal cryptocurrency from your wallet. It doesn’t end there. Hackers can spy on your activities, steal sensitive data, or even destroy files.

Once you’ve fallen for this scam, the damage is in their hands. And the scariest part? This trick works on Mac, Windows, and Linux devices alike.

4. Targets and Outreach Channels

These scammers cast a wide net. They target users on LinkedIn, freelance platforms, Discord, and Telegram. Their bait? High-paying roles at well-known crypto companies like Gemini and Kraken.

To make their scam seem legitimate, they ask plausible interview questions like:

  • “What do you think will be the biggest cryptocurrency trend in the next 12 months?”
  • “How should a business development manager expand partnerships in Southeast Asia or Latin America with limited resources?”

5. Comparing Old vs. New Scams

Old Scam TacticsNew Scam Tactics
Malicious PDF filesFake microphone and camera fixes
Fake software downloadsInstallation of “support tools”
Goal: Install malwareGoal: Create backdoor access to steal crypto and data
Rate this post

Leave a Reply

Your email address will not be published. Required fields are marked *