Thursday, April 10, 2025
Homecyber securityGrassCall Malware Targets Job Seekers to Steal Login Credentials

GrassCall Malware Targets Job Seekers to Steal Login Credentials

Published on

SIEM as a Service

Follow Us on Google News

A newly identified cyberattack campaign, dubbed GrassCall, is targeting job seekers in the cryptocurrency and Web3 sectors through fake job interviews.

Attributed to the Russian-speaking cybercriminal group “Crazy Evil,” the campaign uses fraudulent job postings on platforms like LinkedIn, WellFound, and CryptoJobsList to lure victims into downloading malicious software disguised as a video meeting application.

This malware is designed to steal sensitive information such as login credentials, cryptocurrency wallets, and authentication cookies from both Windows and macOS devices.

- Advertisement - Google News

How the Attack Works

The attackers create fake companies, such as “ChainSeeker.io,” complete with professional-looking websites and social media profiles.

They advertise enticing job opportunities for roles like “Blockchain Analyst” or “Social Media Manager.”

Once a victim applies, they are contacted by a fake Chief Marketing Officer (CMO) via Telegram.

The CMO instructs them to download the GrassCall application from a fraudulent website under the pretense of conducting an online interview.

Upon installation, GrassCall deploys malware tailored to the victim’s operating system.

For Windows users, it installs infostealers like Rhadamanthys or Remote Access Trojans (RATs), while macOS users receive the AMOS Stealer.

These payloads extract stored credentials, cryptocurrency wallet data, and other sensitive information.

Stolen data is often uploaded to Telegram channels where it is monetized.

Evolving Threats and Implications

Recent reports indicate that Crazy Evil has shifted to a new iteration of this campaign, now called VibeCall, which employs similar tactics but with updated malware strains.

The group’s focus on cryptocurrency users highlights the increasing sophistication of financially motivated cybercrime in the digital asset space.

Hundreds of individuals have already fallen victim to this campaign, with many reporting significant financial losses due to drained cryptocurrency wallets.

Cybersecurity experts emphasize the importance of vigilance when applying for jobs in high-risk industries like Web3.

Warning signs include requests to download unknown software or communicate exclusively via unverified platforms like Telegram.

Security firms like Symantec and VMware Carbon Black have implemented detection policies to block associated malware indicators.

Users are advised to:

  • Avoid downloading applications from unverified sources.
  • Cross-check job offers and company details before engaging.
  • Use robust endpoint protection tools that can detect and block infostealers.

As cybercriminals continue to exploit emerging technologies and industries, job seekers must remain cautious and adopt strong cybersecurity practices to safeguard their digital assets.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

PAN-OS DoS Vulnerability Allows Attackers to Force Repeated Firewall Reboots

A newly disclosed denial-of-service (DoS) vulnerability in Palo Alto Networks’ PAN-OS software enables attackers...

Linux Firewall IPFire 2.29 Launches with Post-Quantum Encryption and System Enhancements

The open-source Linux firewall solution, IPFire, has officially released its latest version, IPFire 2.29 - Core...

‘RemoteMonologue’ New Red Team Technique Exploits DCOM To Steal NTLM Credentials Remotely

A sophisticated new red team technique dubbed "RemoteMonologue" has emerged, enabling attackers to remotely...

OpenSSH 10.0 Released: New Protocol Changes and Key Security Improvements

The OpenSSH team has announced the release of OpenSSH 10.0 on April 9, marking an important...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

PAN-OS DoS Vulnerability Allows Attackers to Force Repeated Firewall Reboots

A newly disclosed denial-of-service (DoS) vulnerability in Palo Alto Networks’ PAN-OS software enables attackers...

Linux Firewall IPFire 2.29 Launches with Post-Quantum Encryption and System Enhancements

The open-source Linux firewall solution, IPFire, has officially released its latest version, IPFire 2.29 - Core...

‘RemoteMonologue’ New Red Team Technique Exploits DCOM To Steal NTLM Credentials Remotely

A sophisticated new red team technique dubbed "RemoteMonologue" has emerged, enabling attackers to remotely...