<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>LinkedIn scam Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/linkedin-scam/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/linkedin-scam/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Thu, 17 Apr 2025 14:07:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>LinkedIn scam Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/linkedin-scam/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>North Korean Hackers Target Crypto Devs with Fake Job Offers</title>
		<link>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs-with-fake-job-offers/</link>
					<comments>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs-with-fake-job-offers/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Thu, 17 Apr 2025 15:00:40 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[API theft]]></category>
		<category><![CDATA[crypto dev hack]]></category>
		<category><![CDATA[developer safety]]></category>
		<category><![CDATA[fake job offers]]></category>
		<category><![CDATA[GitHub attacks]]></category>
		<category><![CDATA[LinkedIn scam]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Slow Pisces]]></category>
		<category><![CDATA[TraderTraitor]]></category>
		<category><![CDATA[Web3 security]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=40403</guid>

					<description><![CDATA[<p>North Korean hacking groups are luring crypto developers with fake job offers and coding tests laced with malware, according to cybersecurity experts. Malware Hidden in &#8220;Coding Assignments&#8221; Hackers from the group Slow Pisces (aka Jade Sleet / TraderTraitor) approach developers on LinkedIn, offering dream gigs in DeFi or blockchain security. Once trust is built, they</p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs-with-fake-job-offers/">North Korean Hackers Target Crypto Devs with Fake Job Offers</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="2409" data-end="2571"><strong data-start="2409" data-end="2440">North Korean hacking groups</strong> are luring <strong data-start="2452" data-end="2473">crypto developers</strong> with <strong data-start="2479" data-end="2515">fake job offers and coding tests</strong> laced with malware, according to cybersecurity experts.</p>
<h2 data-start="2573" data-end="2619">Malware Hidden in &#8220;Coding Assignments&#8221;</h2>
<p class="" data-start="2621" data-end="2972">Hackers from the group <strong data-start="2644" data-end="2692">Slow Pisces (aka Jade Sleet / TraderTraitor)</strong> approach developers on LinkedIn, offering dream gigs in <strong data-start="2749" data-end="2757">DeFi</strong> or <strong data-start="2761" data-end="2784">blockchain security</strong>. Once trust is built, they send malware-infected coding challenges hosted on GitHub. When opened, these files steal <strong data-start="2901" data-end="2913">SSH keys</strong>, <strong data-start="2915" data-end="2943">cloud access credentials</strong>, and <strong data-start="2949" data-end="2971">crypto wallet data</strong>.</p>
<hr />
<h4 data-start="1444" data-end="1471"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></h4>
<hr />
<h2 data-start="2974" data-end="3017">Using Freelance Platforms to Spread</h2>
<p class="" data-start="3019" data-end="3159">According to <strong data-start="3032" data-end="3042">Hacken</strong> and <strong data-start="3047" data-end="3057">Cyvers</strong>, platforms like <strong data-start="3074" data-end="3084">Upwork</strong> and <strong data-start="3089" data-end="3099">Fiverr</strong> are also being used by attackers posing as hiring managers.</p>
<p data-start="3019" data-end="3159"><em><span style="font-size: 14.4px;">“They create </span>credible profiles and fake resumes</em><span style="font-size: 14.4px;"><em> just to infiltrate Web3 firms via targeted developers,”</em> says </span>Hayato Shigekawa<span style="font-size: 14.4px;"> of </span>Chainalysis<span style="font-size: 14.4px;">.</span></p>
<h2 data-start="3318" data-end="3348">Security Tips for Devs</h2>
<ul>
<li data-start="3352" data-end="3420">Always use <strong data-start="3363" data-end="3396">virtual machines or sandboxes</strong> to test external code</li>
<li data-start="3423" data-end="3468"><strong data-start="3423" data-end="3444">Verify job offers</strong> via official channels</li>
<li data-start="3471" data-end="3510">Never store secrets in <strong data-start="3494" data-end="3508">plain text</strong></li>
<li data-start="3513" data-end="3579">Be wary of <strong data-start="3524" data-end="3547">unverified packages</strong> and unsolicited opportunities</li>
<li data-start="3582" data-end="3643">Implement <strong data-start="3592" data-end="3615">endpoint protection</strong> and <strong data-start="3620" data-end="3643">operational hygiene</strong></li>
</ul>
<p><em><span style="font-size: 14.4px;">“If it looks </span>too good to be true</em><span style="font-size: 14.4px;"><em>, it probably is,”</em> warns </span><strong style="font-size: 14.4px;" data-start="3708" data-end="3723">Luis Lubeck</strong><span style="font-size: 14.4px;"> of Hacken.</span></p>
<hr />
<p><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs-with-fake-job-offers/">North Korean Hackers Target Crypto Devs with Fake Job Offers</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs-with-fake-job-offers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
