PANews reported on March 19 that Deribit Chief Information Security Officer Anthony Sweeney issued a fraud alert stating that in recent weeks, the number of scammers posing as recruiters has surged, claiming to work for Deribit (and may soon impersonate other well-known companies). The cryptocurrency industry is often a hotbed for new fraud methods, and this type of scam is no exception, and is expected to spread rapidly to other industries.
Social engineering scams mainly lure victims in two ways: one is to offer high-paying job opportunities, and the other is to ask job seekers to keep their job search process confidential from their current employers. The scammers' routine is as follows: first create a LinkedIn profile, pretending to be a recruiter or headhunter for Deribit (or other well-known companies); then post high-paying job advertisements, usually for senior employees or developers who have access to sensitive systems, and contact potential candidates; once the other party's attention is attracted, the scam officially begins.
There are three specific methods: Option A requires the completion of an "online assessment" that actually installs malware; Option B conducts an online interview, provides a job opportunity, and uses "exclusive pre-employment benefits" such as discounted stock in Company X as bait to ultimately defraud money; Option C invites you to meet with the senior team and sign a contract. In the case of Deribit, the scammers lied that it was the Los Angeles office (Deribit does not have an office in the United States) and asked you to bring a work laptop, which is another sign of targeting existing company equipment.
