GrassCall Malware Drains Crypto Wallets via Fake Job Interviews
Posted:
February 28, 2025
Author:
Npav Lab

A dangerous phishing campaign is targeting job seekers in the Web3 and cryptocurrency industry. Attackers are using fake job listings and fraudulent interview invites to trick victims into downloading a malicious video meeting app called GrassCall. Once installed, the malware steals login credentials, authentication data, and cryptocurrency wallets.
- Cybercriminals posted fraudulent job openings on LinkedIn, WellFound, and CryptoJobsList, posing as a company named ChainSeeker.io.
- Applicants received interview invites and were asked to connect with a fake Chief Marketing Officer (CMO) on Telegram to schedule the interview.
- Victims were tricked into downloading the GrassCall app from a fake website. The app installed information-stealing malware on both Windows and Mac devices.
- On Windows, GrassCall installed Rhadamanthys infostealer and a Remote Access Trojan (RAT) to capture passwords and crypto wallets.
- On Mac, it deployed Atomic Stealer (AMOS) to extract stored credentials and sensitive information.
- Attackers uploaded stolen credentials to Telegram channels, where hackers paid for successful data breaches. Victims' crypto wallets were drained once hackers gained access.
- The fraudulent job postings were removed, and applicants were warned to scan their devices for malware.
Cybercriminals are constantly evolving their tactics to steal sensitive data and crypto assets. This GrassCall campaign highlights the growing risk of phishing attacks in the Web3 job market. Job seekers must remain vigilant, verify offers carefully, and follow strong cybersecurity practices to stay protected.
Stay alert, informed, and secure with Net Protector Cyber Security!
Comment(s)
Categories
- Other (42)
- Ransomware (135)
- Events and News (27)
- Features (45)
- Security (452)
- Tips (79)
- Google (23)
- Achievements (10)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (43)
- Malware Alerts (199)
- Cyber Attack (242)
- Data Backup (11)
- Data Breach (90)
- Phishing (151)
- Securty Tips (1)
- Browser Hijack (17)
- Adware (15)
- Email And Password (67)
- Android Security (61)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (7)
- vulnerability (56)
- Hacker (31)
- Spyware (9)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (4)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (10)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (2)
- DMart (1)
- Payment Risk (4)
- Occasion (3)
- firewall (2)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (8)
- Impersonation phishing (1)
- DDoS (5)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)
Recent Posts
Archive
Tags
cyber attack
phishing
data breach
ransomware
cyber threats
ransomeware
phishing attacks
android malware
malware
financial security
data theft
phishing attack
cyber security
cybercrime
network security
data stealing
phishing scam
lockbit
data protection
twitter
data security
critical vulnerability
cyber fraud
cyber threat
trojan
cert-in
financial fraud
phishing email
microsoft
cybercriminals
ddos
india
ddos attack
cyber attack in india
play store
winrar
pakistan-backed hacker
email phishing
clop
server security
android
malicious apps
clop gang
android apps
cryptojacking
ransomware attack
cyberthreats
ransomware attacks
december cyber attacks
databreach