Ad

Phishing Scam Targets Job Seekers with Crypto-Mining Malware


 

Phishing Scam Targets Job Seekers with Crypto-Mining Malware

Cybersecurity leader CrowdStrike has issued a critical warning about a phishing campaign that exploits its own branding to distribute a malicious cryptocurrency miner. The fraudulent scheme, masquerading as a legitimate recruitment process, tricks job seekers into installing an employee CRM application that ultimately delivers the XMRig cryptominer.


How the Phishing Scam Works

According to CrowdStrike, the attack begins with a phishing email impersonating its recruitment team. The email directs recipients to a fraudulent website, where they are urged to download and run a fake CRM tool as part of a supposed hiring process.


Upon execution, the malicious binary conducts various security evasion checks before proceeding to the next attack phase. These checks include:

  • Identifying the presence of debugging tools and malware analysis software.

  • Scanning for virtualization environments to avoid detection.

  • Ensuring that the target system has a sufficient number of active processes and at least a dual-core CPU.


If the system meets all predefined criteria, an error message falsely indicating a failed installation is displayed. Meanwhile, in the background, the malware stealthily downloads the XMRig miner from GitHub, along with its configuration file from an external server ("93.115.172[.]41").


Once installed, the cryptominer executes using preconfigured command-line arguments and maintains persistence by adding a Windows batch script to the Startup folder, ensuring it launches automatically upon system reboot.


CrowdStrike Identifies Malicious Campaign

CrowdStrike discovered this deceptive phishing campaign on January 7, 2025, and has confirmed that it is "aware of scams involving false offers of employment with CrowdStrike." The fraudulent job offer specifically targets individuals applying for junior developer positions, claiming they need to join a recruitment call via the provided CRM tool.


Trend Micro Uncovers Fake LDAPNightmare PoC Luring Security Researchers

In a parallel development, Trend Micro has uncovered another cyber threat exploiting the cybersecurity community. A fake proof-of-concept (PoC) for CVE-2024-49113, a recently disclosed vulnerability in Microsoft's Windows Lightweight Directory Access Protocol (LDAP) known as LDAPNightmare, is being used to distribute an information stealer.


The counterfeit GitHub repository—github[.]com/YoonJae-rep/CVE-2024-49113—was initially believed to be a fork of the legitimate SafeBreach Labs PoC. However, instead of hosting the exploit code, the repository delivered a malicious binary named "poc.exe."


Once executed, the binary drops a PowerShell script that creates a scheduled task to run a Base64-encoded payload. This script subsequently downloads another malicious script from Pastebin, leading to the deployment of an information stealer.


Malware Capabilities and Risks

The final-stage malware is designed to exfiltrate:

  • The machine's public IP address.

  • System metadata and running process lists.

  • Directory and network IP address details.

  • Network adapter configurations and installed updates.


Security researcher Sarah Pearl Camiling warned that "while leveraging PoC repositories for malware distribution is not a novel tactic, this campaign is particularly concerning as it exploits a trending security vulnerability, potentially targeting a wide range of victims."


Protect Yourself from Phishing and Malware Attacks

As cybercriminals continue refining their tactics, users must remain vigilant. Here are some essential security measures:

  1. Verify Recruitment Communications: Always cross-check job offers with official company websites or recruiters.

  2. Avoid Downloading Unverified Software: Never install applications from unknown sources, especially if prompted via email.

  3. Monitor System Activity: Use security tools to detect unauthorized background processes.

  4. Enable Multi-Layered Security: Deploy antivirus software, endpoint protection, and network monitoring solutions.

  5. Stay Updated: Follow cybersecurity advisories to remain informed about the latest threats.


For further updates on cybersecurity threats, follow CrowdStrike and Trend Micro’s official threat intelligence reports.