Deribit executives: Beware of social engineering scams that impersonate Deribit and other cryptocurrency companies to recruit personnel
Deribit's Chief Information Security Officer Anthony Sweeney has issued a fraud alert stating that in recent weeks, the number of scammers impersonating recruiters has surged, falsely claiming to work for Deribit (and may soon also impersonate other well-known companies). The cryptocurrency industry is often a breeding ground for new forms of fraud, and such scams are no exception, expected to quickly spread to other industries. Social engineering scams mainly deceive victims in two ways: one is to provide high paying job opportunities, and the other is to require job seekers to keep the job search process confidential from their current employer. The trick of scammers is as follows: first create a LinkedIn profile and disguise yourself as a recruiter or headhunter for Deribit (or other well-known companies); Post high paying job advertisements again, usually targeting senior employees or developers who have access to sensitive systems and contacting potential candidates; Once it catches the other party's attention, the scam officially begins. There are three specific methods: Option A, which requires completing an "online assessment" but actually installing malicious software; Option B, conduct an online interview, provide job opportunities, and use "exclusive pre employment benefits" such as discounted stocks of Company X as bait to ultimately deceive money; Option C, inviting a meeting with the senior team and signing a contract. In the Deribit case, the scammer falsely claimed to have a Los Angeles office (while Deribit does not have an office in the United States) and requested to bring a work laptop, which is another sign of targeting existing company equipment.