Russian hackers spread GrassCall malware to drain crypto wallets via fake job postings

Source Cryptopolitan

As part of a social engineering campaign, hackers are reportedly sending fake job offers to job seekers in the web3 space with malicious intentions. A dubious meeting app called ‘GrassCall’ was recently used to spread malware that drains the user’s crypto wallets.

The fraud is allegedly carried out by a Russian hacker team known as “Crazy Evil.” This group of cybercriminals specializes in social engineering attacks that trick users into installing infected software on their Mac and Windows PCs. 

Crazy Evil commonly targets people in the crypto space, where they promote fake job opportunities and games via various social media websites. A cybersecurity company, Recorded Future, said that it has connected “over ten active scams on social media” to Crazy Evil.

Hackers posted fake jobs for a sham company called ChainSeeker.io

More recently, reports of another fake scam company surfaced. This time, the company was called ChainSeeker.io, according to an X user. 

According to the reports, threat actors created fake company profiles for ChainSeeker.io on LinkedIn, where they have been sending out premium job listings. Other popular job boards where the fake listing was spotted include CryptoJobList, and WellFound. 

Russian hackers spread GrassCall malware to drain crypto wallets via fake job postings
Job listings by ChainSeeker (Source: choykwok on X)

All those who applied for the jobs were contacted via email, which instructed them to contact the company’s marketing chief on Telegram. 

Russian hackers spread GrassCall malware to drain crypto wallets via fake job postings
Scam emails sent out by ChainSeeker to all job applicants (Source: choykwok on X)

The chief would then request the user download a video calling app named ‘GrassCall’ from a now-deleted website. Depending on the user’s browser, the website would offer them a Mac or Windows client.

Russian hackers spread GrassCall malware to drain crypto wallets via fake job postings
A screenshot of the since-flagged website of the malicious app (Source: BleepingComputer)

After downloading the app, users are asked to enter a code shared by the CMO in the Telegram chat. The website then either provides a Mac “GrassCall_v.6.10.dmg” [VirusTotal] client or a Windows “GrassCall.exe” client [VirusTotal] client. Once the correct code is entered, both apps install an info stealer, like Rhadamanthys (on Windows), remote access trojans (RATs), or other malware. On Macs, the Atomic (AMOS) Stealer malware gets installed.

Russian hackers spread GrassCall malware to drain crypto wallets via fake job postings
Scammer providing GrassCall code to a potential victim (Source: choykwok on X)

Once installed, the virus collects wallet addresses, authentication cookies, and passwords stored in the online browser and Apple Keychain. The stolen information gets uploaded to a server and gets posted on Telegram channels owned by the malicious actors. 

If a wallet is found, the hackers use a brute force method to crack the passwords and drain the user’s assets. From these assets, the hackers pay out the user who made the unsuspecting victim download the malicious app.

According to publicly released payment information, Crazy Evil members apparently earn tens of thousands of dollars per victim.

Russian hackers spread GrassCall malware to drain crypto wallets via fake job postings
Crazy Evil’s Telegram channel showings its earnings per user (Source: G0njxa on X)

Various users have recounted their experiences after applying to such scam job postings. Cristian Ghita, a LinkedIn user, posted on the platform, “It looked legit from almost all angles. Even the video-conferencing tool had an almost believable online presence.”

The hackers have reportedly moved on to a social engineering new campaign

Cybersecurity researcher, Gonjxa, has also identified dubious meeting apps called Gatherum, and VibeCall. Gatherum was used in previous campaign by a subgroup of Crazy Evil called “Kevland.” Interestingly, both apps’ branding is pretty much identical to GrassCall. Now, the scammers have moved on to their new campaign with VibeCall, which is currently being circulated among Web3 job seekers.

In response to the attention this attack received online, Chain Seeker’s job postings have now reportedly been taken down by most of the job boards. 

Russian hackers spread GrassCall malware to drain crypto wallets via fake job postings
Chainseeker.io website is now flagged in community databases

LinkedIn search results do not return any job posts linked to Chainseeker.io anymore. At the same time, its website has been flagged in community databases for being suspicious. Furthermore, LinkedIn accounts of the company’s employees have all been deleted. Users who have already interacted with scammers or installed suspicious apps on their devices are advised to change their passwords and authentication tokens and move their crypto to fresh wallets as a precautionary measure. It is also recommended to turn on two-factor authentication via an authentication app on all websites that support this feature.

Cryptopolitan Academy: Want to grow your money in 2025? Learn how to do it with DeFi in our upcoming webclass. Save Your Spot

Disclaimer: For information purposes only. Past performance is not indicative of future results.
placeholder
Top 3 Price Prediction: BTC, ETH and XRP flash weak momentum, raising risks of deeper pullbacksBitcoin (BTC), Ethereum (ETH), and Ripple (XRP) are showing signs of weakness as momentum fades across the broader crypto market.
Author  FXStreet
Yesterday 03: 38
Bitcoin (BTC), Ethereum (ETH), and Ripple (XRP) are showing signs of weakness as momentum fades across the broader crypto market.
placeholder
Japanese Yen drifts lower amid reduced safe-haven demand, BoJ rate hike uncertaintyThe JPY kicks off the new week on a weaker note amid a combination of factors, which, along with a modest USD uptick, lifts the USD/JPY pair to mid-147.00s during the Asian session.
Author  FXStreet
Yesterday 03: 47
The JPY kicks off the new week on a weaker note amid a combination of factors, which, along with a modest USD uptick, lifts the USD/JPY pair to mid-147.00s during the Asian session.
placeholder
Solana Price Forecast: SOL falls sharply despite record-setting network throughputSolana (SOL) price trades in red, below its key support at $183.13 at the time of writing on Monday, signaling a potential correction ahead.
Author  FXStreet
20 hours ago
Solana (SOL) price trades in red, below its key support at $183.13 at the time of writing on Monday, signaling a potential correction ahead.
placeholder
Gold Weekly Forecast: Easing Geopolitical Tensions, Mixed US Data Limit VolatilityActivity-related data from the US and comments from the Federal Reserve (Fed) officials could drive XAU/USD’s action in the near term.
Author  Beincrypto
19 hours ago
Activity-related data from the US and comments from the Federal Reserve (Fed) officials could drive XAU/USD’s action in the near term.
placeholder
Bitcoin could see increased profit-taking ahead of Powell's speech at Jackson HoleBitcoin could see more profit-taking amid uncertainty ahead of Fed Chair Powell's speech at Jackson Hole.
Author  FXStreet
3 hours ago
Bitcoin could see more profit-taking amid uncertainty ahead of Fed Chair Powell's speech at Jackson Hole.
goTop
quote