Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Job Emails Offer Job Seekers New Malware
Facebook   X   LinkedIn   Email

Job Emails Offer Job Seekers New Malware

April 1, 2025

Even though the unemployment rate isn’t so bad right now, there are still those who can’t resist taking advantage of job seekers. There’s a sneaky scam that's been making the rounds lately—fake job interview emails designed to install cryptocurrency mining malware on your devices. Both Windows and MacOS users are in danger of this one. Cybercriminals are posing as recruiters to lure unsuspecting job seekers into their trap. But they get something less desired than a job offer from these so-called recruiters.

Here's how it works: You receive an email inviting you to schedule an interview. The email includes a link that supposedly leads to an application or scheduling site, often pretending to be from the company CrowdStrike. However, clicking on this link redirects you to a malicious website offering a download for a "CRM application,” which is the Customer Relationship Management software many organizations use. Once downloaded, this application installs the XMRig cryptominer onto your system. This malware hijacks your computer's resources—like the CPU and GPU—to mine cryptocurrency, significantly slowing down your device's performance.

What's particularly concerning is the level of sophistication in these attacks. The malicious executables perform various environmental checks to avoid detection. They scan running processes and check CPU usage to ensure they can operate stealthily. If your device passes these checks, the malware displays a fake error message while downloading additional payloads behind the scenes needed to run the cryptominer. You’ll probably just think your connection is slow.

To protect yourself, always verify the authenticity of unsolicited job offers, especially if you’re not actively seeking new opportunities. Be cautious with links and attachments in emails, especially from unknown sources or any that you aren’t expecting to get. Keep your security software up to date and regularly monitor your system for unusual activity.

Even though these attackers may not be initially after your account credentials, it doesn’t mean they aren’t doing damage or opening avenues for others to grab those. Remember, if something seems too good to be true—like an unexpected job landing in your email—it probably is.


When Sharing Isn't Always A Good Thing: TikTok Shares Your PII

Mobile Security

When Sharing Isn't Always A Good Thing: TikTok Shares Your PII

Growing up, our elders taught us to share with others. Of course, we know they weren’t talking about sharing personal information online. If anything, the latest TikTok hack should be a lesson to us all to be extremely careful about the PII (personally identifiable information) we share online, especially on social media sites. TikTok’s “Find Friends” option was exploited by hackers who used it to steal PII from the account holder and their contacts. READ FULL STORY

Job Search Scams Trending Upwards; Always Look Before You Leap

Scams & Phishing

Job Search Scams Trending Upwards; Always Look Before You Leap

Getting the job of your dreams is what many of us wish for. However, knowing the difference between a real opportunity and a scam offer can keep job seekers safe from the clutches of cyber-crooks looking to reel them in. After days and weeks of online job searches, that perfect job may now be just a click away. But that's not the time to dive in headfirst. The FBI weighed in on fake employment scams, referring to them as an old trick with big improvements. READ FULL STORY

Executive Impersonations Lead to $2.7 Billion in Costs To Businesses

Corporate Security

Executive Impersonations Lead to $2.7 Billion in Costs To Businesses

Executive impersonation attacks, also known as CEO fraud or whaling attacks, are a type of phishing attack where attackers pose as a high-level executive, such as a CEO, CFO, or other C-Level, in order to trick employees into revealing sensitive information or transferring money. Essentially, these are other ways attackers use Business Email Compromise (BEC) attacks. Executive impersonation attacks can be very costly for businesses. In 2022, the FBI's Internet Crime Report found that these types of attacks cost businesses over $2.7 billion. READ FULL STORY

Has Your Account Been Compromised? Five Cyber Smart Tips Everyone Can Use

Your Security

Has Your Account Been Compromised? Five Cyber Smart Tips Everyone Can Use

The transition to living life through our devices has become very real for scores of people and businesses. By now, the coronavirus has changed our lives in ways we never expected. This transition includes doing most things from home. Unfortunately, adapting to online life also gives bad actor’s a cornucopia of targets to exploit. There are proactive steps to take when you suspect an account may be compromised, including ways to help keep it from happening to begin with. READ FULL STORY

The BBB Warns of Top Scams

Scams & Phishing

The BBB Warns of Top Scams

The Better Business Bureau’s (BBB) Institute for Marketplace Trust reports on scams. The organization even has a tracker. And it has documented the top ten going around that everyone needs to be aware of. At the top of their list are investment scams and employment scams; but they aren’t the only ones. Scammers don’t care who you are, where you live, or how old you are—they go after everyone. Read about the latest ones the BBB is warning to look out for. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...