Hackers have been caught impersonating the reputable cybersecurity firm CrowdStrike in a cunning malware scheme. The criminals are circulating fraudulent job offers to entice victims into unwittingly downloading the XMRig cryptojacker under the guise of an “employee CRM application”. This malicious software mines the Monero cryptocurrency, favored by cybercriminals for its privacy features.
Monero’s design makes it elusive to trace, setting it apart as a preferred option for malware schemes like XMRig. This mining malware typically hogs a device’s processing power, rendering it sluggish – a telltale sign of infection. However, the perpetrators behind this latest campaign have cap XMRig’s usage to just 10%, aiming to avoid detection. Moreover, the malware inserts a batch script into the Start Menu Startup directory to ensure it remains active every time the computer boots up.
CrowdStrike contends that this operation is relatively new, but online scams offering fake employment opportunities have become increasingly common. Notably, the group Lazarus from North Korea has gained notoriety for its “Operation DreamJob”, targeting software developers and prominent figures in technology, aerospace, defense, and government sectors with deceptive job listings.
The cybersecurity community is advised to exercise caution and remain vigilant while engaging online, as cyber threats continue to evolve in sophistication and scale. Through awareness and proactive measures, individuals and organizations can combat such malicious campaigns and protect themselves from falling victim to cybercrime.
(Source: BleepingComputer)