Breaking
February 27, 2025

Russian Cybercrime Group Uses Fake Job Interviews and ‘GrassCall’ App to Drain Crypto Wallets Nicholas Say | usagoldmines.com

Crazy Evil, a Russian-speaking cybercrime group, has executed a sophisticated social engineering attack targeting hundreds of job seekers in the cryptocurrency and Web3 space, according to a new report from BleepingComputer.

Web3 job seekers have lost their crypto assets in a new wallet-draining scam. In a hard economy, scams are normal.

One of their subgroups, known as “KEVLAND,” reportedly built a fake website called “ChainSeeker.io” and used this fake identity to post premium Web3 job listings on major platforms like LinkedIn, WellFound, and CryptoJobsList.

Brutal!

Following their applications, victims received emails directing them to a fake “Chief Marketing Officer” on Telegram. This “CMO” then instructed them to download a phony video meeting application called “GrassCall” from the malicious website grass[.]net.

ChainSeeker jobs promoted on CryptoJobsListSource: Choy
ChainSeeker jobs promoted on CryptoJobsList
Source: Choy

Upon downloading, the “GrassCall” app initiated a dual-pronged malware attack, tailored to the victim’s operating system. Windows users were infected with Rhadamanthys RAT and infostealers, granting attackers remote access and data exfiltration capabilities.

Mac users were targeted with the Atomic (AMOS) Stealer, a potent malware designed to compromise macOS systems.

The installed malware stole private information, including passwords, authentication cookies, cryptocurrency wallets, Apple keychain data, and files that store passwords. After that, the stolen data was uploaded to the attackers’ servers and shared within their Telegram channels.

If cryptocurrency wallets were found, the attackers attempted to brute-force passwords and drain the funds. The group would then pay members that successfully got the malware installed on the victim’s machine.

Well Orchestrated Scheme

Investigators found the “GrassCall” website was not original, but a clone of the “Gatherum” site. Moreover, the attackers impersonated real people for ChainSeeker.io’s nonexistent leadership. The job listings have been removed from job boards, except for one that is still active on LinkedIn.

“This scam was extremely well-orchestrated,” said Cristian Ghita, a LinkedIn user who applied to the company. “They had a website, LinkedIn and X profiles, and employees listed.”

The scale of the operation is becoming increasingly apparent, with dozens of victims recounting similar experiences on social media. Many have reported huge financial losses as their cryptocurrency holdings were drained.

Security experts are urging victims to take immediate action, including changing passwords on an uninfected device and transferring cryptocurrency to new, secure wallets.

Recorded Future, a threat intelligence firm, had previously warned that crypto, NFT, and gaming professionals were “prime targets” for this type of attack.

Crazy Evil has been known for targeting the cryptocurrency and Web3 ecosystems through sophisticated social engineering tactics and malware distribution. Apart from “KEVLAND,” the group operates other fine subteams, known as “AVLAND,” “TYPED,” “DELAND,” “ZOOMLAND,” and “DEF.”

The group specializes in identity fraud, cryptocurrency theft, and deploying information-stealing malware. They target high-value victims, including tech, gaming, and crypto influencers.

Sadly It Works….

Crazy Evil employs a range of malware tools, such as StealC, Atomic macOS Stealer (AMOS), and Angel Drainer, to compromise both Windows and macOS systems.

According to Recorded Future, the group has conducted over 10 active scams on social media since 2021. Their common tactic is to lure their targets to install malware, like the most recent one.
There have been numerous other cryptocurrency job scams targeting those who are on a job hunt. The FBI has warned against cryptocurrency job scams, including those involving fake job offers that require victims to make cryptocurrency payments.

Scammers post job ads offering unusually high pay for simple tasks, often requiring victims to accept payment in cryptocurrencies like Bitcoin or Ethereum. These jobs may involve tasks that seem legitimate but are indeed part of a money laundering scheme.

The federal authorities have advised individuals to be cautious of unsolicited job offers, avoid making cryptocurrency payments to employers, and report suspicious activities to the agency.

The post Russian Cybercrime Group Uses Fake Job Interviews and ‘GrassCall’ App to Drain Crypto Wallets appeared first on Blockonomi.

 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

World Network in Philippines to Battle Scams with Human ID Nicholas Say | usagoldmines.com

Kaspersky Uncovers Mobile Malware Targeting Crypto Users on iOS and Android Oliver Dale | usagoldmin...

Warning: The Telegram Verification Bot Could Empty Your Crypto Wallet Oliver Dale | usagoldmines.com

Animoca Brands Co-founder Yat Siu’s X Account Hacked to Promote Fake Solana Memecoin Nicholas Say | ...

Hyperliquid Token Falls 21% Following North Korean Hacking Concerns Oliver Dale | usagoldmines.com

LastPass Hackers Steal $5.36M From Users Days Before Holidays Nicholas Say | usagoldmines.com

Ledger Hardware Wallet User Reports $2.5M Digital Asset Loss Oliver Dale | usagoldmines.com

Google’s Willow Quantum Chip: A Step Forward in Computing, But Bitcoin Remains Secure Oliver Dale | ...

Cardano Foundation X Account Compromised, False SEC Claims Circulate Oliver Dale | usagoldmines.com

Japanese Exchange DMM Bitcoin to Cease Operations After $320 Million Hack Nicholas Say | usagoldmine...

Sumsub Partners with Elliptic to Strengthen Crypto Fraud Prevention and Compliance Tools Oliver Dale...

Crypto Platform’s $12M Nightmare: Inside the Polter Finance Hack Oliver Dale | usagoldmines.com

Phantom Wallet iOS Update Error Results in User Fund Access Problems Oliver Dale | usagoldmines.com

X Account Hack Forces Terminal of Truths Developer to Relocate $1.8M in Crypto Oliver Dale | usagold...

Radiant Capital Hit by $50M Blockchain Security Breach Nicholas Say | usagoldmines.com

US, UK, and Australia Target Russian Cybercrime Syndicate | usagoldmines.com

LEGO Website Experiences Brief Hack Promoting Fake Cryptocurrency | usagoldmines.com

Google Play Hosts Crypto Wallet Drainer for Five Months, $70,000 Stolen | usagoldmines.com

Bedrock Protocol Reports $2M Exploit: Reimbursement Plan in Progress | usagoldmines.com

MEV Bot’s $12 Million Flash Loan Yields Meager $20 Profit | usagoldmines.com

Binance Collaborates with Indian Authorities to Uncover $47.6M Gaming Scam | usagoldmines.com

FBI Warns of “Pig Butchering” Schemes Targeting Crypto Investors | usagoldmines.com

Binance Investigates and Refutes Alleged 12.8 Million User Data Leak | usagoldmines.com

Sam Altman’s Company Falls Victim to Online Crypto Fraud | usagoldmines.com

BingX Exchange Hacked: $43 Million Stolen, Users to be Reimbursed | usagoldmines.com

Truflation Reports $5 Million Loss in Malware Attack on Blockchain Platform | usagoldmines.com

Leave a Reply