Cyber ​​fraud is happy

Cyber ​​fraud is happyCyber ​​fraud is happy


Cyber ​​fraud: Cyber ​​criminals have now become adept at cheating people in new ways. Recently, cyber security researchers have revealed a new online cyber scam in which job cakers are being targeted. This fraud is targeting professionals seeking jobs especially in the web3 and cryptocurrency sector. This scam is being carried out through LinkedIn and a video calling app.

How is cheating?

According to a report by bleepingcomputer, cyber criminals are putting fake job posts on Linkedin and other platforms. When a candidate interrogates these jobs, he is asked to download a Melivian video call app “GrassCall”. Through this app, cyber thugs steal information including bank details of people.

So far, hundreds of people have fallen victim to this scam, many of which have also suffered financial loss. The special thing is that this Grasscall Malware can damage both Mac and Windows devices.

Who is running this cyber scam?

The report has revealed that a Russian cyber criminal group “Crazy Evil” is behind this scam. This group is notorious for social engineering attachment in which they steal their data by downloading the merciless software to users. A subgroup of this group “Kevland” was managing this operation. The thugs posted job advertisements by creating a fake company called “chainseeeker.io” on websites like Linkedin, Wellfound and Cryptojobslist. A professional website and social media accounts were also prepared in the name of this company, which had a profile of fake employees and attractive job descriptions.

Hunting was implicated on the pretext of interview

When the candidates applied for these jobs, they were sent emails for a virtual interview. In this email, he was asked to contact the company’s Chief Marketing Officer (CMO) on Telegram. Then fake CMO used to ask candidates to download “GrassCall” video calling app. But in fact Grasscall was a Melivianus app, which started stealing personal information as soon as it was installed in the phone or computer.

How did Grasscall malware work?

In the Windows device, it used to install a Remote Access Trojan (RAT) and RHADAMANTHYS Info-Staler. In the Mac device, it used to put malware called Atomic Stealer (AMOS), designed to steal sensitive data. This malware used to scan Stord Data in the device and used to steal the cruptocraccile wallet details, save passwords in the browser, cookies of online accounts and financial information.

How to avoid such online job scam

  • Confirm the jobs posted on LinkedIn and other job platforms.
  • Check its credibility before downloading an unknown app.
  • Be cautious if a company asks to interview Telegram or other unsafe chat apps.
  • Avoid clicking on any suspicious link and always get information from official websites.

Also read:

Vivo T4X will be launched next week, great features will be available at affordable prices, price also came up



Source link

onlinenews24seven:
whatsapp
line