Crazy Evil hacker group creates fake Web3 company to trick job seekers into downloading malware

PANews reported on February 27 that according to Decrypt, the hacker group Crazy Evil created a fake Web3 company called "ChainSeeker.io" to trick job seekers in the crypto industry into downloading malware that steals wallet funds.

According to cybersecurity website Bleeping Computer, the group set up profiles on LinkedIn and X, recruiting for standard crypto industry positions such as "blockchain analyst" or "social media manager." They also placed premium ads on sites such as LinkedIn, WellFound and CryptoJobsList to increase the visibility of their ads. Job seekers then received an email from the "Chief Human Resources Officer" of the fake company, inviting them to contact the fake "Chief Marketing Officer" (CMO) via Telegram.

The so-called CMO then urges them to download and install a virtual meeting software called GrassCall and enter a code provided by the CMO. GrassCall then installs various information-stealing malware or remote access trojans (RATs) that search for crypto wallets, passwords, Apple Keychain data, and authentication cookies stored in web browsers.

Most of the ads appear to have been removed from social media.

Share to:

Author: PA一线

This content is for market information only and is not investment advice.

Follow PANews official accounts, navigate bull and bear markets together