In a sophisticated scam, cybercriminals have been using fake crypto job listings and a malicious meeting app called GrassCall to drain cryptocurrency wallets. This operation, linked to the Russia-based cybercrime group Crazy Evil, highlights the evolving threats in the digital currency space.
How the Scam Works Fake Job Listings: Scammers created a fake crypto firm called Chain Seeker and posted job openings on platforms like LinkedIn and specialized crypto job boards. These listings attracted numerous applicants eager to enter the booming crypto industry.
Social Engineering: Once applicants expressed interest, they were directed to contact a fake “Chief Marketing Officer” via Telegram. This contact then instructed them to download the GrassCall app from a controlled website.
Malicious App: The GrassCall app installed malware on both Windows and Mac systems. On Windows, it deployed Rhadamanthys RAT and infostealers, allowing keystroke logging and seed phishing attacks. On Macs, it used Atomic (AMOS) Stealer to compromise Apple Keychain, browser cookies, and crypto wallet files.