GrassCall Malware Drains Crypto Wallets via Fake Job Interviews

A dangerous phishing campaign is targeting job seekers in the Web3 and cryptocurrency industry. Attackers are using fake job listings and fraudulent interview invites to trick victims into downloading a malicious video meeting app called GrassCall. Once installed, the malware steals login credentials, authentication data, and cryptocurrency wallets.
- Cybercriminals posted fraudulent job openings on LinkedIn, WellFound, and CryptoJobsList, posing as a company named ChainSeeker.io.
- Applicants received interview invites and were asked to connect with a fake Chief Marketing Officer (CMO) on Telegram to schedule the interview.
- Victims were tricked into downloading the GrassCall app from a fake website. The app installed information-stealing malware on both Windows and Mac devices.
- On Windows, GrassCall installed Rhadamanthys infostealer and a Remote Access Trojan (RAT) to capture passwords and crypto wallets.
- On Mac, it deployed Atomic Stealer (AMOS) to extract stored credentials and sensitive information.
- Attackers uploaded stolen credentials to Telegram channels, where hackers paid for successful data breaches. Victims' crypto wallets were drained once hackers gained access.
- The fraudulent job postings were removed, and applicants were warned to scan their devices for malware.
Cybercriminals are constantly evolving their tactics to steal sensitive data and crypto assets. This GrassCall campaign highlights the growing risk of phishing attacks in the Web3 job market. Job seekers must remain vigilant, verify offers carefully, and follow strong cybersecurity practices to stay protected.
Stay alert, informed, and secure with Net Protector Cyber Security!
Comment(s)
Categories
- Other (42)
- Ransomware (148)
- Events and News (27)
- Features (45)
- Security (473)
- Tips (79)
- Google (23)
- Achievements (11)
- Products (34)
- Activation (7)
- Dealers (1)
- Bank Phishing (45)
- Malware Alerts (218)
- Cyber Attack (264)
- Data Backup (11)
- Data Breach (102)
- Phishing (158)
- Securty Tips (1)
- Browser Hijack (18)
- Adware (15)
- Email And Password (69)
- Android Security (71)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (8)
- vulnerability (57)
- Hacker (31)
- Spyware (9)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (5)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (7)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (11)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (5)
- Amazon (2)
- DMart (1)
- Payment Risk (4)
- Occasion (3)
- firewall (2)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (12)
- Impersonation phishing (1)
- DDoS (6)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)
Recent Posts
Archive
Tags
cyber attack
phishing
phishing attacks
data breach
cyber threats
ransomware
ransomeware
phishing attack
malware
android malware
data theft
cyberthreats
cyber security
financial security
phishingattack
cybercrime
data stealing
phishing scam
network security
credential theft
ddos attack
data security
critical vulnerability
net protector total security
trojan
cert-in
financial fraud
phishing email
microsoft
lockbit
cybercriminals
cyberattack
cyber crime
ddos
cyber threat
data protection
india
twitter
cyber fraud
clop
ransomware attacks
server security
malicious apps
android apps
credit card theft
play store
databreach
pakistan-backed hacker
winrar
email phishing