Crypto Exchange Deribit warns against scams using false recruiters profiles


Crypto Options Exchange Deribit issued a scam alert, warning against false recruiters using LinkedIn to target job seekers.

Cryptocurrency exchange discomfort has raised concerns about a growing scam in which fraudsters pretend to be recruiters to deceive job seekers, targeting in particular developers and superior professionals in the cryptographic industry.

In A post X On March 19, Anthony Sweeney, the Director of Information Security of Deribit, revealed that the company had seen “an increase in crooks posing as recruiters claiming to work for the deriibute”. He noted that such fraud tactics often appear in the crypto before spreading elsewhere.

According to Deribit, the crooks create false LinkedIn profiles, pretending to be talented scouts for the company. They publish advertisements for well -paid jobs and contact candidates in private. Once they have established contacts, they use different tactics to steal the victims.

Deribit describes several tactics used in the scam, including requests for candidates to make an “online assessment” which installs malicious software. In other cases, the crooks offer false jobs with “exclusive pre-shooting advantages” such as actions at reduced prices, only to steal the victim’s money.

Some even organize meetings in person for an assumed contract signature, asking candidates to “have your work laptop” brought “, a step that could indicate an attempt to access the sensitive data of the company.

The exchange advised job seekers to remain cautious, suggesting that they verify the profiles of recruiters and check the job offers through the company’s official channels. In January, the global supplier of the Cybersecurity Supplier Crowdstrike identified a phishing campaign operating its recruitment emails to distribute a malicious monero mine software.

The company whose headquarters is in Austin explained that the scam uses false job offers to encourage people to download an application that installs the minor XMRIG on their system. Crowdstrike says that phishing emails pretend to be its recruitment process, attracting victims of a false website. There, they are invited to download an “CRM application of employees”, which is actually a downloader to cryptocur up.



Leave a Reply

Your email address will not be published. Required fields are marked *