
Developers Beware: This Fake LinkedIn Interview Campaign is Targeting YOU (And Your SSH Keys)
If you are a backend developer, DevOps engineer, or work in the Web3/Crypto space, you need to read this immediately. There is a sophisticated, ongoing cyberattack campaign targeting developers on LinkedIn. The attackers pose as enthusiastic co-founders or recruiters, lure you through a fake vetting process, and then deploy devastating malware by convincing you to download and run their "company MVP" code. I recently encountered this exact scenario, and thanks to a healthy dose of suspicion, I avoided a massive security breach. Here is exactly how the scam works, the anatomy of the conversation, and the red flags you must look out for. The Anatomy of the Scam The "Contagious Interview" campaign, as security researchers call it, is a masterclass in social engineering. It follows a distinct pattern designed to build trust before the final payload. Phase 1: The Initial Hook It starts with a connection request or a cold InMail from someone who appears to be a legitimate founder or technica
Continue reading on Dev.to
Opens in a new tab



