LinkedIn Job Interview Scams: Beware of Malware Downloads

Why Trust Techopedia

If a job interview ever comes with a request to download software — best to avoid it.

Phishing scams or social engineering attempts to get people to install malware may not be the newest cybersecurity trend, but what is startling is how sophisticated these are becoming in 2025.

In this virtual version of the ‘long con,’ security experts, including Bitdefender Labs, warn of job interview scams, which usually involve unsolicited job interview offers. If job seekers accept these legitimate-sounding requests, often originating on LinkedIn, they find themselves speaking to different fictitious ’employees’ of a legitimate-seeming company — everyone from the Human Resources team to their future manager.

The overall aim of this catfishing with a jobseeker twist is to get the applicant to download malware disguised as a training exercise or work tool, steal their personal information, and, in some cases, drain their digital wallets.

One of the most advanced scams yet appears linked to the North Korean hacker group Lazarus, which allegedly steals more than $300m in cryptocurrency annually.

Key Takeaways

  • A new LinkedIn job scam involves fake recruiters to create a convincing facade of a new career move.
  • After passing initial tests, victims are tricked into downloading malicious “training exercises.”
  • The scam is thought to be linked to the North Korean hacking group Lazarus. It aims to install info-stealer malware that targets browser data and crypto wallets.
  • Scams include offering fake training courses towards the end of a selection process for certification that does not exist.
  • To stay safe, never download software for an interview.

Real-Life Victims & BitDefender Investigation

LinkedIn is full of posts from people who have been duped (or nearly duped) into downloading software during an interview, as well as reports of fake recruiters on LinkedIn trying many paths to extract data or dollars from job seekers.

Advertisements

The Khaleej Times reported the story of ‘T Jonas,’ who passed the first round of a job interview before being informed he needed additional certification to proceed. Once he had paid $1,900 to a recommended “institution,” the recruiter vanished.

His tale is not the first, nor will it be the last:

Ironically, one such phishing attempt was exposed when a malicious recruitment operation targeted a BitDefender employee via LinkedIn.

Turning the tables, BitDefender followed the attempt through — to find that the test exercises they were sent contained cross-platform info-stealers, compatible with Windows, MacOS, and Linux operating systems, that were designed to steal their crypto keys for popular wallets, including MetaMask, Phantom, TonWallet, and Crypto.com.

With the lure of a high compensation package, remote work, flexible hours, and a meeting with the CEO — who could resist? — the final stage of the interview, where the hackers hope you take the bait, was a training exercise that required a quick download to complete.

According to BitDefender researchers, “After receiving the requested information, the criminal shared a repository containing the project’s “minimum viable product” (MVP). He also included a document with questions that can only be answered by executing the demo.

“At first glance, the code appears harmless. However, closer inspection reveals a heavily obfuscated script that dynamically loads malicious code from a third-party endpoint.”

A Job Offer With More Than You Bargained For

A code snippet showing obfuscated code that loads malicious software from a third-party source, discovered during a job interview test.
BitDefender found obfuscated code in an interview test that loads malicious code from a third-party. Source: BitDefender

Once deployed, BitDefender found an info-stealer payload delivered to their computer, which proceeded to hunt browser extensions for popular cryptocurrency wallets.

These crypto wallets included
  • MetaMask
  • BNB Chain Wallet
  • TronLink
  • Phantom
  • Coin98 Wallet
  • Crypto.com | Onchain
  • Kaia Wallet
  • Rabby Wallet
  • Argent X – Starknet Wallet
  • OKX Wallet
  • Core | Crypto Wallet & NFT Extension
  • Tonkeeper — Wallet for TON
  • Exodus Web3 Wallet
  • TON Wallet
  • OpenMask – TON Wallet
  • SafePal Extension Wallet
  • MyTonWallet · My TON Wallet
  • Solflare Wallet
  • Atomic Wallet
  • MathWallet

The info-stealer also collected browser login data and sent the information to a malicious IP address.

It didn’t stop there. Finally, it downloaded and executed a host of Python scripts, beginning with one called main99_65.py, to allow for further exfiltration activities, including hooking keyboard events and monitoring a user’s clipboard before sending the content back.

The files included:

mlip.py
  • Hooks keyboard events specifically targeting web browsers.
  • Monitors clipboard changes system-wide for crypto-related data.
  • Immediately sends stolen data to a remote attacker-controlled server.
pay.py
  • Reports system/network info to the attacker.
  • Searches for and exfiltrates valuable files (documents, environment variables, private keys, crypto mnemonics) and uploads these files to the attacker’s C2 server.
  • Maintains a persistent communication channel for additional commands and scripts.
bow.py
  • Iterates over the following browsers: Chrome, Brave, Opera, Yandex, Microsoft Edge.
  • Extracts and exfiltrates sensitive browser data (logins and payment info) for Windows, Linux, and macOS.
  • Runs the Tsunami Injector python script that connects to multiple Pastebins to reach the URL for the payload (.exe 617205f5a241c2712d4d0a3b06ce3afd).

BitDefender said: “The threat actors’ infection chain is complex, containing malicious software written in multiple programming languages and using a variety of technologies.

“[These include] multi-layered Python scripts that recursively decode and execute themselves, a JavaScript stealer that first harvests browser data before pivoting to further payloads, and .NET-based stagers capable of disabling security tools, configuring a Tor proxy, and launching crypto miners.”

While BitDefender engaged with the hackers in a secured environment, it allowed them to follow their ploy and said the malware and operational tactics “strongly suggests the involvement of state-sponsored threat actors, specifically those from North Korea.”

BitDefender added: “While we’ve discussed malicious job offers, it has been observed that the same threat actors have tried to infiltrate various companies by faking identities and applying for a multitude of job positions.

“The result would be approximately the same: private information, credentials, and technology would be exfiltrated by corporate spies.”

How to Stay Safe From Scam Job Adverts

  • Watch out for vague job descriptions, particularly unsolicited ones that are not advertised elsewhere.
  • Watch out for poor spelling and grammar in emails and direct messages.
  • Treat any attachments, including PDFs and DOC files, as suspicious, and make sure your computer has up-to-date virus scanners.
  • Exercise extreme caution if a recruiter suggests a non-standard video chat or instant messaging program for conversations — stick with Zoom, Skype, Microsoft Teams, or Google Meet (and be suspicious of files sent over those applications, too).
  • Remember that an interviewer should never ask you to download a GitHub repository or similar or install a program.
  • If you must run code of some kind, use a virtual machine or a sandbox mode.

The Bottom Line

In many ways, these are old tricks — trying any method to get malware onto your machine.

Whether it is phishing for personal information, extracting money from you for training courses, or scanning your machine in the hopes of finding cryptocurrency, there is valuable content sitting on most of our hard drives.

What is different here, however, is the amount of effort hackers are willing to invest when spearfishing a target — from multiple calls with various people to legitimate-looking documents and websites and training exercises built from the ground up to look convincing.

So next time you are bracing yourselves for a stressful enough job interview, ensure the company you are talking to is not a house of cards.

FAQs

What is the LinkedIn job interview scam?

How do scammers trick job seekers on LinkedIn?

How can I tell if a job offer is fake?

What kind of malware is used in these scams?

What should I do if I receive a suspicious job offer?

Advertisements

Related Reading

Related Terms

Advertisements
Eddie Wrenn
Senior Content Editor
Eddie Wrenn
Senior Content Editor

Eddie is Techopedia's Senior Editor who has previously worked in local, national, and international newsrooms in the UK and Australia, including Mail Online and Sydney's Daily Telegraph over the past 20 years. As a former science and technology editor, he focuses on emerging technologies and breaking news at Techopedia. He has also previously worked in product teams at Microsoft and News Corp, where he focused on introducing new editorial tools to newsrooms. He currently resides in London, UK, and spends his free time reading and scuba diving.

',a='';if(l){t=t.replace('data-lazy-','');t=t.replace('loading="lazy"','');t=t.replace(/