GrassCall Malware Drains Crypto Wallets via Fake Job Interviews

A dangerous phishing campaign is targeting job seekers in the Web3 and cryptocurrency industry. Attackers are using fake job listings and fraudulent interview invites to trick victims into downloading a malicious video meeting app called GrassCall. Once installed, the malware steals login credentials, authentication data, and cryptocurrency wallets.
- Cybercriminals posted fraudulent job openings on LinkedIn, WellFound, and CryptoJobsList, posing as a company named ChainSeeker.io.
- Applicants received interview invites and were asked to connect with a fake Chief Marketing Officer (CMO) on Telegram to schedule the interview.
- Victims were tricked into downloading the GrassCall app from a fake website. The app installed information-stealing malware on both Windows and Mac devices.
- On Windows, GrassCall installed Rhadamanthys infostealer and a Remote Access Trojan (RAT) to capture passwords and crypto wallets.
- On Mac, it deployed Atomic Stealer (AMOS) to extract stored credentials and sensitive information.
- Attackers uploaded stolen credentials to Telegram channels, where hackers paid for successful data breaches. Victims' crypto wallets were drained once hackers gained access.
- The fraudulent job postings were removed, and applicants were warned to scan their devices for malware.
Cybercriminals are constantly evolving their tactics to steal sensitive data and crypto assets. This GrassCall campaign highlights the growing risk of phishing attacks in the Web3 job market. Job seekers must remain vigilant, verify offers carefully, and follow strong cybersecurity practices to stay protected.
Stay alert, informed, and secure with Net Protector Cyber Security!
Comment(s)
Categories
- Other (42)
- Ransomware (142)
- Events and News (27)
- Features (45)
- Security (466)
- Tips (79)
- Google (23)
- Achievements (11)
- Products (34)
- Activation (7)
- Dealers (1)
- Bank Phishing (44)
- Malware Alerts (212)
- Cyber Attack (259)
- Data Backup (11)
- Data Breach (97)
- Phishing (154)
- Securty Tips (1)
- Browser Hijack (18)
- Adware (15)
- Email And Password (68)
- Android Security (70)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (8)
- vulnerability (56)
- Hacker (31)
- Spyware (9)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (4)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (7)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (11)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (2)
- DMart (1)
- Payment Risk (4)
- Occasion (3)
- firewall (2)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (10)
- Impersonation phishing (1)
- DDoS (5)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)
Recent Posts
Archive
Tags
cyber attack
phishing
data breach
phishing attacks
cyber threats
ransomware
phishing attack
ransomeware
malware
android malware
cyber security
data theft
phishingattack
cyberthreats
financial security
data stealing
cybercrime
network security
ddos attack
data security
critical vulnerability
cyber fraud
trojan
net protector total security
data protection
cert-in
financial fraud
phishing email
microsoft
lockbit
cybercriminals
cyber crime
ddos
phishing scam
cyber threat
india
twitter
android
ransomware attacks
cryptojacking
winrar
malicious apps
pakistan-backed hacker
android apps
email phishing
play store
server security
databreach
clop
ransomware attack