The crypto world is facing a new and insidious type of scam. Cyber attackers are targeting victims with fake job listings, infecting their devices with malware, and potentially stealing their crypto assets. Here’s what you need to know about this dangerous method:
The New Scam Technique: Microphone and Camera Access Issue
Scammers have developed a more subtle approach, replacing malicious PDF files or fake video conference software with a new method. This time, they convince victims that they need to resolve a microphone and camera access issue.
When the victim follows the instructions, malware is installed on their device, giving attackers full access. The malware creates a backdoor, allowing the attackers to empty the victim’s crypto wallet.
How the Scam Works
- Scammers reach out to victims through professional networks like LinkedIn, Discord, Telegram, and freelance platforms. They post fake job listings using the names of well-known crypto firms such as Gemini or Kraken.
- During the interview, victims are asked detailed questions about the future of the crypto industry or business development with limited budgets, with the goal of building trust.
- At the end of the interview, the victim is asked to record a video on the “Willo | Video Interviewing” platform. At this point, the victim believes they are facing a microphone and camera access issue.
- To resolve the issue, they are instructed to change browser settings or restart their browser. These actions ultimately result in malware being installed.
This method targets Mac, Windows, and Linux operating systems. Anyone responding to recruitment requests on professional networks could be a potential victim.
How to Protect Yourself
- Be cautious of unexpected job offers and think twice before clicking on links.
- Verify any applications or websites that request microphone and camera access.
- If you’ve been exposed to malware, immediately reset your device.
This new method of crypto scams can lead to significant financial losses if you’re not careful. To protect yourself and your assets, always stay cautious and question requests from unknown sources. Never blindly trust instructions sent to you to resolve any technical issues.
You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our Telegram, YouTube, and Twitter channels for the latest news and updates.