A new scam is gaining momentum in March 2025, and blockchain developers and project founders are especially at risk. With social engineering tactics becoming increasingly sophisticated, it's important to stay ahead of potential threats. This article outlines some of the most advanced and deceptive scams, particularly those targeting job seekers in Web3, and provides actionable steps to protect yourself.
Scammers impersonate recruiters or employees of well-known Web3 companies. They approach blockchain developers on LinkedIn or Telegram with flattering messages and high-paying job offers.
The victim is invited to an "interview," but the scammers claim they use a "secure, in-house video conferencing tool" instead of Zoom or Google Meet.
Once the victim installs the software and joins the interview, their system is compromised, leading to the theft of wallet funds. The attack works by detecting and sweeping funds from hot wallets like MetaMask or Phantom.
A scammer contacts you with a request to audit or test a GitHub repository. They send a Bitbucket or GitHub link, claiming it's a work-related test or a proof of concept. Sounds legit, and many will not notice anything suspicious. And that would be a fatal mistake.
The repository contains malicious code designed to extract private keys, inject malware, or execute wallet-draining scripts.
The victim runs the provided script or opens a compromised user interface (UI) that requests private key access.
Scammers offer extremely high salaries (e.g., $150+ per hour or $250K+ yearly) for simple blockchain-related work. Bu there is a “small nuance”. They ask for personal information, including GitHub, CV, and even direct access to test repositories.
Eventually, they request that you install their software, test a smart contract, or deploy a script — one that compromises your system.
Scammers claim that for "security reasons," they use a proprietary meeting tool instead of known platforms. They send a link that looks like Zoom, Google Meet, or Telegram but is actually a phishing site.
When opened, the malicious site installs a script that either extracts browser-stored private keys or deploys clipboard hijackers.
Attackers build "legit-looking" LinkedIn profiles with fake endorsements and AI-generated backgrounds. They engage in friendly, long-term social engineering before making their move.
If a victim refuses one scam, they may attempt a different angle — fake token sales, job offers, or investment opportunities.
As blockchain developers and founders, you're a prime target for scammers due to the nature of your work and access to valuable assets. Implementing strict security measures — such as hardware wallets, separate work environments, and in-depth verification processes — will drastically reduce your risk of falling victim to these scams.
Key Takeaways:
If you come across new scams or need further insights, share your experiences — awareness is our best defense.