Breaking News

Fake job interview emails that install hidden cryptocurrency mining malware


The job market hasn’t been great in the past few years, especially in tech, which is why many people are actively looking for work.

Fraudsters take advantage of this. They came up with a new trick where they pretend to be recruiters to spread the word crypto miners on people’s devices.

It starts with an email inviting the person to schedule a job interview. But when they click on the link, a malicious app is installed that secretly mines cryptocurrency. This application hijacks your computer’s resources, such as CPU and GPU, which significantly slows down its performance.

I’M GIVING AWAY THE LATEST AND BEST AIRPODS PRO 2

A person typing on his laptop. (Kurt “CyberGuy” Knutsson)

What you need to know

This malicious campaign begins with an email that tricks victims into thinking it’s part of the recruitment process, as reported Dark reading. In most cases, these emails pretend to be from recruiters at the cybersecurity firm CrowdStrike.

The fake email contains a link that claims to take the recipient to a page where they can schedule an interview. However, in reality, it redirects the victim to a malicious website that offers a download for a supposed “CRM application”.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

The site offers download options for both Windows and macOS. No matter which option the victim chooses, the download will be a Windows executable written in Rust. This executable is then downloaded by the XMRig cryptominer.

The executable performs several environment checks to analyze the device and avoid detection. Scans running processes, checks CPU and more. If the device passes these checks, the executable will display a fake error message while surreptitiously downloading the additional payloads needed to run the XMRig miner.

Downloading a fake CrowdStrike job application. (CrowdStrike)

HERE’S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T USERS

How does cryptomanner affect your computer?

A crypto mining application can significantly affect your computer’s performance. Once installed, it hijacks your computer’s resources, including CPU and GPU, to secretly mine cryptocurrency. This process requires a lot of computing power, which can cause your system to slow down drastically. You may notice that your computer is unresponsive, working more than usual, or using more energy.

In some cases, prolonged use of cryptominer can also lead to hardware damage due to increased load on your components. Additionally, these miners often work in the background without your knowledge, making it difficult to detect problems until the damage has already been done.

CrowdStrike is aware of the scam and advises individuals to remain vigilant. “This campaign highlights the importance of being vigilant against phishing scams, especially those targeting job seekers. Individuals in the recruitment process should verify the authenticity of CrowdStrike communications and avoid downloading unsolicited files, the the company said in a blog post.

“Organizations can reduce the risk of such attacks by educating employees about phishing tactics, monitoring suspicious network traffic, and using endpoint protection solutions to detect and block malicious activity.”

CLICK HERE TO SET FOX BUSINESS IN CRETE

People working on their laptops. (Kurt “CyberGuy” Knutsson)

BEWARE OF ENCRYPTED PDFS AS THE LATEST MALWARE DELIVERY TRICK

5 ways to protect yourself from job interview scams

1. Make sure you have applied for a job: If you receive an unsolicited interview invitation, consider whether you really applied for that job or company. Scammers often target job seekers at random, hoping someone will take the bait. If you haven’t signed up, it’s probably a scam. Always confirm directly with the company before proceeding.

2. Check the recruiter’s credentials: Always double-check the recruiter’s information before replying to an email or clicking on any link. Confirm their email address, LinkedIn profile and affiliation with the company. Legitimate businesses will use official email domains, not free services like Gmail or Yahoo.

3. Avoid downloading unwanted files: Be wary of emails asking you to download files or applications. Legitimate recruitment processes rarely require software to be installed. If you are unsure, please contact the company directly to confirm your claim.

4. Review links before clicking: Hover over any link in the email to see their actual URL. Fraudsters often use URLs that mimic legitimate websites, but with subtle differences. If the link looks suspicious, avoid clicking on it.

5. Use powerful antivirus software: Use strong antivirus or endpoint protection software to detect and block malicious downloads. Update your security tools regularly to make sure they can effectively deal with new threats.

The best way to protect yourself from malicious links that install malware, potentially accessing your personal information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android, and iOS devices.

WHAT TO DO IF YOUR BANK ACCOUNT HACKED

Kurt’s key to the outside

Cybercriminals always manage to come up with new ways to exploit people. Although this scam is more focused on using your computer’s resources than stealing data, it is still very dangerous. This shows that if a hacker can easily install software on your computer, they can also steal your financial information and other personal information. Always check the email you receive and try not to download anything you don’t trust.

Have you ever received a suspicious email that looked like a job offer? Let us know by writing to us at Cyberguy.com/Contact

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report newsletter by going to Cyberguy.com/Newsletter

Ask Kurt a question or tell us what stories you want us to cover.

Follow Kurt on his social channels:

Answers to the most frequently asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
Social Media Auto Publish Powered By : XYZScripts.com