Hackers Steal Crypto Assets Through “Microphone Debugging”

scam 7478783 1920

Job seekers targeting cryptocurrency companies have encountered a new cybercrime scheme aimed at stealing their assets, revealed by MetaMask developer Taylor Monahan.

On platforms like LinkedIn, Discord, Telegram, and freelance websites, scammers pose as recruiters from companies such as Kraken, MEXC, Gemini, and Meta. They offer roles for technical specialists, traders, and analysts, with salaries ranging from $200,000 to $350,000.

Victims are invited to a text-based interview via the Willo platform, where they are asked questions about the cryptocurrency market and tasked with developing a business expansion strategy. In the final stage, candidates are asked to record a video response.

During the recording, a pop-up window requests access to the user’s microphone and camera. The platform then simulates a hardware error, prompting users to update drivers or restart their browser.

Following these “recommendations” installs a backdoor on the victim’s device, giving hackers access and enabling them to steal cryptocurrency assets.

The attack targets macOS, Windows, and Linux operating systems.

Monahan did not disclose the number of victims or the total financial damage.

Previously, the attack on Japanese cryptocurrency exchange DMM Bitcoin resulted in $308 million in losses. It also started with a fake recruiter on LinkedIn, who compromised an employee from a third-party company with access to the exchange’s assets. According to the FBI, the incident was orchestrated by North Korean state-backed hackers known as TraderTraitor.