COMING SOON: A New Way to Earn Passive Income with DeFi in 2025 LEARN MORE

Russian hackers spread GrassCall malware to drain crypto wallets via fake job postings

In this post:

  • Russian hackers distributed malware via a fake meeting app called GrassCall to drain crypto wallets.
  • This social engineering campaign is linked to cybercrime group Crazy Evil.
  • The group targets victims via fake job postings on social media and Web3 job boards.

As part of a social engineering campaign, hackers are reportedly sending fake job offers to job seekers in the web3 space with malicious intentions. A dubious meeting app called ‘GrassCall’ was recently used to spread malware that drains the user’s crypto wallets.

The fraud is allegedly carried out by a Russian hacker team known as “Crazy Evil.” This group of cybercriminals specializes in social engineering attacks that trick users into installing infected software on their Mac and Windows PCs. 

Crazy Evil commonly targets people in the crypto space, where they promote fake job opportunities and games via various social media websites. A cybersecurity company, Recorded Future, said that it has connected “over ten active scams on social media” to Crazy Evil.

Hackers posted fake jobs for a sham company called ChainSeeker.io

More recently, reports of another fake scam company surfaced. This time, the company was called ChainSeeker.io, according to an X user

According to the reports, threat actors created fake company profiles for ChainSeeker.io on LinkedIn, where they have been sending out premium job listings. Other popular job boards where the fake listing was spotted include CryptoJobList, and WellFound. 

Russian hackers spread GrassCall malware to drain crypto wallets via fake job postings
Job listings by ChainSeeker (Source: choykwok on X)

All those who applied for the jobs were contacted via email, which instructed them to contact the company’s marketing chief on Telegram. 

Russian hackers spread GrassCall malware to drain crypto wallets via fake job postings
Scam emails sent out by ChainSeeker to all job applicants (Source: choykwok on X)

The chief would then request the user download a video calling app named ‘GrassCall’ from a now-deleted website. Depending on the user’s browser, the website would offer them a Mac or Windows client.

See also  Pump.fun activity is grinding to a halt, Solana (SOL) inflows dry out
Russian hackers spread GrassCall malware to drain crypto wallets via fake job postings
A screenshot of the since-flagged website of the malicious app (Source: BleepingComputer)

After downloading the app, users are asked to enter a code shared by the CMO in the Telegram chat. The website then either provides a Mac “GrassCall_v.6.10.dmg” [VirusTotal] client or a Windows “GrassCall.exe” client [VirusTotal] client. Once the correct code is entered, both apps install an info stealer, like Rhadamanthys (on Windows), remote access trojans (RATs), or other malware. On Macs, the Atomic (AMOS) Stealer malware gets installed.

Russian hackers spread GrassCall malware to drain crypto wallets via fake job postings
Scammer providing GrassCall code to a potential victim (Source: choykwok on X)

Once installed, the virus collects wallet addresses, authentication cookies, and passwords stored in the online browser and Apple Keychain. The stolen information gets uploaded to a server and gets posted on Telegram channels owned by the malicious actors. 

If a wallet is found, the hackers use a brute force method to crack the passwords and drain the user’s assets. From these assets, the hackers pay out the user who made the unsuspecting victim download the malicious app.

According to publicly released payment information, Crazy Evil members apparently earn tens of thousands of dollars per victim.

Russian hackers spread GrassCall malware to drain crypto wallets via fake job postings
Crazy Evil’s Telegram channel showings its earnings per user (Source: G0njxa on X)

Various users have recounted their experiences after applying to such scam job postings. Cristian Ghita, a LinkedIn user, posted on the platform, “It looked legit from almost all angles. Even the video-conferencing tool had an almost believable online presence.”

The hackers have reportedly moved on to a social engineering new campaign

Cybersecurity researcher, Gonjxa, has also identified dubious meeting apps called Gatherum, and VibeCall. Gatherum was used in previous campaign by a subgroup of Crazy Evil called “Kevland.” Interestingly, both apps’ branding is pretty much identical to GrassCall. Now, the scammers have moved on to their new campaign with VibeCall, which is currently being circulated among Web3 job seekers.

See also  Bom malware robs users of over $1.82 million: SlowMist

In response to the attention this attack received online, Chain Seeker’s job postings have now reportedly been taken down by most of the job boards. 

Russian hackers spread GrassCall malware to drain crypto wallets via fake job postings
Chainseeker.io website is now flagged in community databases

LinkedIn search results do not return any job posts linked to Chainseeker.io anymore. At the same time, its website has been flagged in community databases for being suspicious. Furthermore, LinkedIn accounts of the company’s employees have all been deleted. Users who have already interacted with scammers or installed suspicious apps on their devices are advised to change their passwords and authentication tokens and move their crypto to fresh wallets as a precautionary measure. It is also recommended to turn on two-factor authentication via an authentication app on all websites that support this feature.

Cryptopolitan Academy: Tired of market swings? Learn how DeFi can help you build steady passive income. Register Now

Share link:

Disclaimer. The information provided is not trading advice. Cryptopolitan.com holds no liability for any investments made based on the information provided on this page. We strongly recommend independent research and/or consultation with a qualified professional before making any investment decisions.

Most read

Loading Most Read articles...

Stay on top of crypto news, get daily updates in your inbox

Editor's choice

Loading Editor's Choice articles...
Subscribe to CryptoPolitan