GitHub · The Register
Dev targeted by sophisticated job scam: 'I let my guard down, and ran the freaking code'
Compiled by KHAO Editorial — aggregated from 1 outlet. See llms.txt for citation guidance.
◌ Single Source
EXCLUSIVE It all started with a LinkedIn message, as so many employment scams do these days.
Key facts
- Plus, he used to work for Step Finance before a breach and subsequent $40 million cryptocurrency heist shuttered the decentralized-finance biz earlier this year
- Still, in the short time
- 56 seconds total
- the code was running before he killed his Wi-Fi, the crooks had collected 634 saved Chrome passwords, Vujičić's macOS keychain, and his MetaMask wallet
- And then they steal his credentials, drain his crypto wallets, infect his registries, and compromise his CI/CD pipelines, as they've seen in recent developer-targeted attacks
- EXCLUSIVE It all started with a LinkedIn message, as so many employment scams do these days
Summary
A recruiter claiming to work for a blockchain firm called Genusix Labs invited Boris Vujičić, a web developer based in Serbia, to apply for a full-time, remote developer job with the company. Vujičić is no stranger to recruitment scams. "Everybody I know who is in the crypto world and looking for a job is targeted using these hacks," Vujičić said Register. He usually ignores these messages, or sometimes toys with the senders, to "waste their time and, as a challenge, to search for where their viruses are hidden.