Site iconSite icon ForkLog

Hackers Exploit ‘Microphone Debugging’ to Steal Crypto Assets

Hackers Exploit 'Microphone Debugging' to Steal Crypto Assets

Job seekers in cryptocurrency firms have encountered a new cybercriminal scheme aimed at stealing their assets, according to MetaMask developer Taylor Monahan.

According to her, fraudulent job offers have spread on LinkedIn, freelancer sites, Discord, and Telegram, purportedly from bitcoin exchanges Kraken, MEXC, Gemini, Meta Corporation, and others. Fake recruiters are seeking candidates for technical specialists, traders, and analysts with salaries ranging from $200,000 to $350,000.

Initially, the victim is invited to a text interview on the Willo website, where they are asked about trends in the crypto market and tasked with developing a business expansion strategy on a limited budget. The final task on organizing team work requires the applicant to record a video response. 

A browser pop-up requests access to the user’s microphone and camera. However, the page then displays an equipment error. To resolve it, the site suggests updating drivers and restarting the browser.

Following these “recommendations” leads to the installation of a backdoor, granting attackers access to the victim’s devices and enabling them to steal cryptocurrency funds.

The attack affects macOS, Windows, and Linux operating systems.

Monahan did not specify the number of potential victims or the amount of damage.

Earlier, an attack on the Japanese cryptocurrency exchange DMM Bitcoin, resulting in $308 million in damages, also began with a fraudulent recruiter on LinkedIn who compromised an employee of a third-party company with access to the platform’s assets. According to the FBI, state-sponsored North Korean hackers known as TraderTraitor were behind the incident.

Exit mobile version