Forward the Original Title‘Crypto job scams: How hackers trick applicants and how to stay safe’
Scams & Hacks
The rapidly growing cryptocurrency market, combined with the rise of remote work culture, has created a fertile ground for job scams. Scammers prey on hopeful applicants with promises of high-paying remote positions. They lure the applicants into scams that steal their funds and personal data, using sophisticated tactics to deceive the victims.
Job scams have proven highly effective, which explains why thousands of people continue to fall victim to them. Chainalysis revealed that daptonerecordsmusicalbums[.]com, a fraudulent job site pretending to be a record label, amassed more than $300,000 in Bitcoin BTC $83,271 and Ether ETH $1,908 in just two months. Another deceptive website outlierventures-app.com received 362 deposits over a single week totaling $95,000.
This article will explore common crypto job scams, how hackers cheat unsuspecting applicants and key warning signs. It also shares tips to protect yourself from falling victim, ensuring your job search remains scam-free in the crypto space.
Crypto job scams are fraudulent schemes where scammers pose as legitimate employers in the cryptocurrency industry to deceive job seekers. Promising high-paying remote jobs that require minimal effort, they trick applicants into sharing personal data, paying upfront fees or downloading malware disguised as onboarding software.
Fraudulent crypto job scammers often use phishing emails or fake job postings on platforms like LinkedIn and Telegram to scam their victims. Once victims fall for the scam, they may lose funds, have their crypto wallets drained or unknowingly install spyware.
The scamsters may impersonate established companies and lure targets for fake reviews of store applications, products, streaming music or hotels. For instance, they may position themselves as recruiters of TikTok, hiring for product and purchasing reviews.
Did you know? Binance suffered major losses due to phishing scams, with September 2024 alone seeing approximately $46 million stolen through fake customer support. Over Q3, these scams targeted roughly 11,000 users monthly, resulting in a total loss of $127 million.
Recruitment scams in the crypto industry often trick job seekers into paying money under false pretenses. Scamsters usually lure people with promises of simple online tasks, such as booking travel or watching advertisements in exchange for income.
Here are a few common ways of how crypto recruitment scams work:
Did you know? California’s financial regulator warns of seven new types of crypto, AI scams. These include fake BTC mining schemes, where fraudsters offer fake investments in mining and fake crypto gaming schemes, where users deposit funds only to have their wallets drained.
Understanding the hiring process will help you distinguish real opportunities from fraudulent schemes. Here is the process of hiring for fake cryptocurrency jobs, though it might work a bit differently for each:
Crypto job scams operate by gradually luring victims into depositing money under the guise of earning easy profits. Scammers often present seemingly legitimate tasks, such as clicking ads, submitting reviews, booking hotels or placing product orders. The specific tasks vary based on the platform’s theme, but the core tactic remains the same — victims must complete repetitive actions, like clicking buttons, to earn money.
Victims are usually required to complete 30-50 clicks per job session, following instructions from a so-called “supervisor.” Initially, scammers may allow a small withdrawal to build trust. However, they soon encourage victims to deposit more funds to access higher-paying assignments. The scammer will ensure that withdrawals never exceed the total deposited amount, keeping victims engaged with a fake commission balance.
Scammers may introduce a fake “lucky” event to further exploit victims, claiming the user has unlocked a bonus-earning opportunity. However, to continue, the victim must deposit additional funds. At some point, an “error” will prevent further actions, with the scammer pushing for even higher deposits to resolve the issue. Many unsuspecting users fall into this trap, ultimately losing all their money to the fraudsters before realizing the deception.
Some crypto job scams use large group chats on platforms like Telegram or WhatsApp. These chats are filled with fake accounts that pressure victims, boast about fabricated earnings and manipulate them into depositing larger accounts, a tactic quite closely resembling pig butchering scams.
Crypto job scams have become a nuisance for job seekers and genuine recruiters. Here are a few real-world examples of crypto job scams:
On Feb. 26, BleepingComputer reported that scammers used a malicious meeting app called “GrassCall” to target Web3 job seekers through fake job interviews. The app installed information-stealing malware designed to steal passwords and wallet credentials. The campaign affected hundreds of job seekers, with some victims reporting their wallets were drained.
The attack was orchestrated by “Crazy Evil,” a cybercrime group specializing in social engineering tactics. They deceived users into downloading malicious software by promoting fake job opportunities and blockchain-related games on social media.
The scammers created a fictitious company called “ChainSeeker.io” with a website and social media presence on X and LinkedIn. They even posted premium job listings on LinkedIn, WellFound and CryptoJobsList platforms.
Applicants were sent interview invites instructing them to contact a fake chief marketing officer (CMO) via Telegram. The CMO would then direct them to download “GrassCall” from “grasscall[.]net,” which offered tailored downloads for Windows or Mac users.
Cybersecurity researcher g0njxa discovered that GrassCall was a clone of another fraudulent platform, Gatherum. The malware installed included remote access trojans (RATs) and info-stealers like Rhadamanthys for Windows and Atomic Stealer (AMOS) for Mac, which are designed to extract sensitive information and cryptocurrency assets.
Attackers upload the stolen data to their servers and the information is shared in cybercrime Telegram channels. When they find a crypto wallet, passwords are brute-forced, assets stolen and payments issued to those who successfully tricked victims into downloading the software.
After the report’s publication, CryptoJobsList removed the fraudulent listings and advised applicants to scan their devices. The “GrassCall” site has since been taken down, but attackers have pivoted to a new campaign called “VibeCall.”
Did you know? If a game you installed turns out to be malware, immediately disconnect your internet and turn off your device. To safeguard your assets, transfer cryptocurrency and recovery phrases from the compromised device to a secure location using a clean alternative device.
In Feb. 2025, CrowdStrike, a cybersecurity firm, identified a phishing campaign where scammers impersonated the company to trick job seekers into downloading a Monero cryptocurrency miner (XMRig).
The scam began with an email from a fake CrowdStrike recruiter thanking applicants for applying for a developer role. The email invited them to download a supposed “employee CRM application” from a fraudulent website resembling the official CrowdStrike portal.
The website (“cscrm-hiring[.]com”) offered Windows and macOS versions of the fraudulent tool. Once downloaded, the application performed checks to ensure it was not working in the analysis environment. For this purpose, it verified system details like process numbers, presence of debuggers and CPU core count.
Once the victim was found conducive to infection, the tool displayed a fake error message, claiming the installer file was corrupt. Meanwhile, it fetched a configuration file to run XMRig in the background, downloaded the miner from GitHub, and installed it in the “%TEMP%\System” folder.
The malware added a batch script to the start menu startup directory and modified the system registry. The miner ran in the background using minimal processing power (10%) to avoid detection.
A Binance Square post on June 25, 2023, discussed fraudsters using WhatsApp to contact a person they called Mark, offering him a high-paying part-time job (~1000 USDt per week), with payments made through an encrypted wallet. The caller claimed they were working for a London-based digital marketing firm. The job offered minimal skills, had flexible rules and only required a cell phone.
Impressed, Mark followed the recruiter’s instructions and created an account on their platform. He was then asked to deposit 500 Tether to receive his first 40 assignments. Trusting the process, Mark transferred the funds and completed the tasks. However, the platform blocked him when he attempted to withdraw his money. The recruiter then demanded an additional 1,000 USDt to release his funds.
At this point, Mark realized he had fallen for a scam.
Another Binance Square post warned that ‘www.travelsunrise.work’ is a fake job website. Binance took swift action by locking down the fraudulent address, preventing users from incurring losses.
Crypto job scams exploit psychological biases to trap victims into making payments they wouldn’t otherwise consider. At first glance, paying a company to earn money seems absurd. However, scammers thrive on emotions, financial desperation and behavioral tendencies to manipulate their targets. Three key psychological mechanisms make victims fall for these scams:
These tactics create a powerful psychological trap, making victims feel they must continue paying into the scam. Unfortunately, by the time they realize the deception, they have often lost significant sums with no way to recover them.
Here is how you can protect yourself from crypto job scams:
If you have fallen victim to a phony crypto job and recruitment scam, here are the steps you need to take:
Crypto job scams are likely to become more advanced as scammers use more sophisticated technology and refine their tactics. In the future, they might use AI-generated deepfake recruiters that pretend to be from actual companies and even conduct video interviews that look real. Phishing emails may also become more competent, with scammers using AI to dig into the target’s online activity and create fake job offers that look personal and more relevant.
To stop these scams, better monitoring and comprehensive awareness campaigns are needed. Social media platforms and job websites should strengthen their verification processes to ensure only genuine companies can use these platforms. Training institutes need to teach their students how to recognize fraud.
Blockchain tracking tools can help regulatory and law-enforcing agencies detect and flag suspicious transactions, making it harder for scammers to steal money. AI-based fraud detection can catch fake job ads and scam messages.
Finally, lawmakers should centralize crypto scam reporting (especially in the US) under a single authority to better protect victims. Currently, multiple agencies handle these cases, resulting in a fragmented system. Strengthening international cooperation between these agencies is essential to effectively curb fake crypto job scams.
Пригласить больше голосов
Содержание
Forward the Original Title‘Crypto job scams: How hackers trick applicants and how to stay safe’
Scams & Hacks
The rapidly growing cryptocurrency market, combined with the rise of remote work culture, has created a fertile ground for job scams. Scammers prey on hopeful applicants with promises of high-paying remote positions. They lure the applicants into scams that steal their funds and personal data, using sophisticated tactics to deceive the victims.
Job scams have proven highly effective, which explains why thousands of people continue to fall victim to them. Chainalysis revealed that daptonerecordsmusicalbums[.]com, a fraudulent job site pretending to be a record label, amassed more than $300,000 in Bitcoin BTC $83,271 and Ether ETH $1,908 in just two months. Another deceptive website outlierventures-app.com received 362 deposits over a single week totaling $95,000.
This article will explore common crypto job scams, how hackers cheat unsuspecting applicants and key warning signs. It also shares tips to protect yourself from falling victim, ensuring your job search remains scam-free in the crypto space.
Crypto job scams are fraudulent schemes where scammers pose as legitimate employers in the cryptocurrency industry to deceive job seekers. Promising high-paying remote jobs that require minimal effort, they trick applicants into sharing personal data, paying upfront fees or downloading malware disguised as onboarding software.
Fraudulent crypto job scammers often use phishing emails or fake job postings on platforms like LinkedIn and Telegram to scam their victims. Once victims fall for the scam, they may lose funds, have their crypto wallets drained or unknowingly install spyware.
The scamsters may impersonate established companies and lure targets for fake reviews of store applications, products, streaming music or hotels. For instance, they may position themselves as recruiters of TikTok, hiring for product and purchasing reviews.
Did you know? Binance suffered major losses due to phishing scams, with September 2024 alone seeing approximately $46 million stolen through fake customer support. Over Q3, these scams targeted roughly 11,000 users monthly, resulting in a total loss of $127 million.
Recruitment scams in the crypto industry often trick job seekers into paying money under false pretenses. Scamsters usually lure people with promises of simple online tasks, such as booking travel or watching advertisements in exchange for income.
Here are a few common ways of how crypto recruitment scams work:
Did you know? California’s financial regulator warns of seven new types of crypto, AI scams. These include fake BTC mining schemes, where fraudsters offer fake investments in mining and fake crypto gaming schemes, where users deposit funds only to have their wallets drained.
Understanding the hiring process will help you distinguish real opportunities from fraudulent schemes. Here is the process of hiring for fake cryptocurrency jobs, though it might work a bit differently for each:
Crypto job scams operate by gradually luring victims into depositing money under the guise of earning easy profits. Scammers often present seemingly legitimate tasks, such as clicking ads, submitting reviews, booking hotels or placing product orders. The specific tasks vary based on the platform’s theme, but the core tactic remains the same — victims must complete repetitive actions, like clicking buttons, to earn money.
Victims are usually required to complete 30-50 clicks per job session, following instructions from a so-called “supervisor.” Initially, scammers may allow a small withdrawal to build trust. However, they soon encourage victims to deposit more funds to access higher-paying assignments. The scammer will ensure that withdrawals never exceed the total deposited amount, keeping victims engaged with a fake commission balance.
Scammers may introduce a fake “lucky” event to further exploit victims, claiming the user has unlocked a bonus-earning opportunity. However, to continue, the victim must deposit additional funds. At some point, an “error” will prevent further actions, with the scammer pushing for even higher deposits to resolve the issue. Many unsuspecting users fall into this trap, ultimately losing all their money to the fraudsters before realizing the deception.
Some crypto job scams use large group chats on platforms like Telegram or WhatsApp. These chats are filled with fake accounts that pressure victims, boast about fabricated earnings and manipulate them into depositing larger accounts, a tactic quite closely resembling pig butchering scams.
Crypto job scams have become a nuisance for job seekers and genuine recruiters. Here are a few real-world examples of crypto job scams:
On Feb. 26, BleepingComputer reported that scammers used a malicious meeting app called “GrassCall” to target Web3 job seekers through fake job interviews. The app installed information-stealing malware designed to steal passwords and wallet credentials. The campaign affected hundreds of job seekers, with some victims reporting their wallets were drained.
The attack was orchestrated by “Crazy Evil,” a cybercrime group specializing in social engineering tactics. They deceived users into downloading malicious software by promoting fake job opportunities and blockchain-related games on social media.
The scammers created a fictitious company called “ChainSeeker.io” with a website and social media presence on X and LinkedIn. They even posted premium job listings on LinkedIn, WellFound and CryptoJobsList platforms.
Applicants were sent interview invites instructing them to contact a fake chief marketing officer (CMO) via Telegram. The CMO would then direct them to download “GrassCall” from “grasscall[.]net,” which offered tailored downloads for Windows or Mac users.
Cybersecurity researcher g0njxa discovered that GrassCall was a clone of another fraudulent platform, Gatherum. The malware installed included remote access trojans (RATs) and info-stealers like Rhadamanthys for Windows and Atomic Stealer (AMOS) for Mac, which are designed to extract sensitive information and cryptocurrency assets.
Attackers upload the stolen data to their servers and the information is shared in cybercrime Telegram channels. When they find a crypto wallet, passwords are brute-forced, assets stolen and payments issued to those who successfully tricked victims into downloading the software.
After the report’s publication, CryptoJobsList removed the fraudulent listings and advised applicants to scan their devices. The “GrassCall” site has since been taken down, but attackers have pivoted to a new campaign called “VibeCall.”
Did you know? If a game you installed turns out to be malware, immediately disconnect your internet and turn off your device. To safeguard your assets, transfer cryptocurrency and recovery phrases from the compromised device to a secure location using a clean alternative device.
In Feb. 2025, CrowdStrike, a cybersecurity firm, identified a phishing campaign where scammers impersonated the company to trick job seekers into downloading a Monero cryptocurrency miner (XMRig).
The scam began with an email from a fake CrowdStrike recruiter thanking applicants for applying for a developer role. The email invited them to download a supposed “employee CRM application” from a fraudulent website resembling the official CrowdStrike portal.
The website (“cscrm-hiring[.]com”) offered Windows and macOS versions of the fraudulent tool. Once downloaded, the application performed checks to ensure it was not working in the analysis environment. For this purpose, it verified system details like process numbers, presence of debuggers and CPU core count.
Once the victim was found conducive to infection, the tool displayed a fake error message, claiming the installer file was corrupt. Meanwhile, it fetched a configuration file to run XMRig in the background, downloaded the miner from GitHub, and installed it in the “%TEMP%\System” folder.
The malware added a batch script to the start menu startup directory and modified the system registry. The miner ran in the background using minimal processing power (10%) to avoid detection.
A Binance Square post on June 25, 2023, discussed fraudsters using WhatsApp to contact a person they called Mark, offering him a high-paying part-time job (~1000 USDt per week), with payments made through an encrypted wallet. The caller claimed they were working for a London-based digital marketing firm. The job offered minimal skills, had flexible rules and only required a cell phone.
Impressed, Mark followed the recruiter’s instructions and created an account on their platform. He was then asked to deposit 500 Tether to receive his first 40 assignments. Trusting the process, Mark transferred the funds and completed the tasks. However, the platform blocked him when he attempted to withdraw his money. The recruiter then demanded an additional 1,000 USDt to release his funds.
At this point, Mark realized he had fallen for a scam.
Another Binance Square post warned that ‘www.travelsunrise.work’ is a fake job website. Binance took swift action by locking down the fraudulent address, preventing users from incurring losses.
Crypto job scams exploit psychological biases to trap victims into making payments they wouldn’t otherwise consider. At first glance, paying a company to earn money seems absurd. However, scammers thrive on emotions, financial desperation and behavioral tendencies to manipulate their targets. Three key psychological mechanisms make victims fall for these scams:
These tactics create a powerful psychological trap, making victims feel they must continue paying into the scam. Unfortunately, by the time they realize the deception, they have often lost significant sums with no way to recover them.
Here is how you can protect yourself from crypto job scams:
If you have fallen victim to a phony crypto job and recruitment scam, here are the steps you need to take:
Crypto job scams are likely to become more advanced as scammers use more sophisticated technology and refine their tactics. In the future, they might use AI-generated deepfake recruiters that pretend to be from actual companies and even conduct video interviews that look real. Phishing emails may also become more competent, with scammers using AI to dig into the target’s online activity and create fake job offers that look personal and more relevant.
To stop these scams, better monitoring and comprehensive awareness campaigns are needed. Social media platforms and job websites should strengthen their verification processes to ensure only genuine companies can use these platforms. Training institutes need to teach their students how to recognize fraud.
Blockchain tracking tools can help regulatory and law-enforcing agencies detect and flag suspicious transactions, making it harder for scammers to steal money. AI-based fraud detection can catch fake job ads and scam messages.
Finally, lawmakers should centralize crypto scam reporting (especially in the US) under a single authority to better protect victims. Currently, multiple agencies handle these cases, resulting in a fragmented system. Strengthening international cooperation between these agencies is essential to effectively curb fake crypto job scams.