Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert & block trade
Convert crypto with one click and zero fees
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
Crazy Evil's GrassCall scam tricks crypto job seekers

Crazy Evil's GrassCall scam tricks crypto job seekers

GrafaGrafa2025/02/27 10:40
By:Mahathir Bayena

A cybercrime group named "Crazy Evil" is reportedly using fake job offers and a malicious application called "GrassCall" to deploy information-stealing software that targets and drains cryptocurrency wallets.

This scheme has impacted numerous job seekers in the Web3 space.

The group, identified as a Russia-based "traffer team," specialises in social engineering tactics to trick individuals into downloading malware.

Cybersecurity firm Recorded Future reported that Crazy Evil has been linked to over ten active scams on social media, explicitly targeting the cryptocurrency sector.

One of their earlier scams, Gatherum, was a similar meeting app with the same branding as GrassCall.

Crazy Evil created a fake crypto firm called "Chain Seeker," complete with social media accounts and job listings on LinkedIn, CryptoJobsList, and WellFound.

Applicants were contacted via email and asked to connect with the "Chief Marketing Officer" on Telegram.

The fake CMO then instructed the job seekers to download the malicious GrassCall app from a website under their control.

LinkedIn user Cristian Ghita noted the scam was well-orchestrated, with a professional website, LinkedIn and X profiles, and listed employees.

The GrassCall software, hosted on a website, offered Windows and Mac versions depending on the visitor's browser.

Once installed, the software deployed information-stealing malware, such as the Rhadamanthys RAT on Windows and the Atomic (AMOS) Stealer on Macs.

This malware steals passwords, authentication cookies, and cryptocurrency wallets.

Stolen data is then uploaded to the attackers' servers.

Cybersecurity researcher g0njxa stated that the RAT is used to gain persistent access to the infected machine, install a keylogger, and initiate phishing attempts to steal seed phrases from crypto wallets.

Victims are advised to use an uninfected device to change passwords and move their crypto to new wallets.

CryptoJobsList has removed the fraudulent job listings.

The website is no longer active due to the public attention to the scam.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!

You may also like