How to Recognize and Avoid Job Scams
Scam schemes in job vacancies are becoming increasingly sophisticated, especially in the IT sector. This guide will help you spot the signs of a scam in time and protect your data and assets.
🚨 CRITICALLY IMPORTANT!
- Never log into suspicious platforms using your Google, Apple, GitHub, or any other personal accounts at the request of employers
- Never transfer money to an employer "for registration", "as a deposit", "to test the payment system", or under any other pretext
- Do not connect cryptocurrency wallets or give access to them
- Do not send verification codes, passwords, seed phrases, or any other data for access to your accounts or wallets
Red Flags of a Scam Job Offer (What to Watch Out For):
- Excessively high salary: The offer is significantly above the market rate for the specified qualifications and experience.
- They require you to run their code or install software: Especially for a test task or before a formal interview, this is often a way to distribute malware.
- They ask you to log into their "corporate" platforms: Requiring authorization through Google, Apple, GitHub, or other accounts on suspicious websites — the goal is to steal access to your accounts.
- Suspicious profiles and website: "Recruiter" profiles on social media appear inactive, fake (check photos via Google Images!). The company website is poorly made, recently created, or immediately asks to connect a wallet.
- Oddities in communication: Categorical refusal of video calls, excessive rushing, and pressure to make you decide quickly.
How the Scam Typically Works:
You receive an interview invitation on LinkedIn or find a promising job opening on Hirify — everything looks professional and legit. Scammers frequently look for developers under the pretext of "finishing a project," "helping with a nearly completed application," or "urgent system development."
After a brief initial conversation, which they might try to quickly move to Telegram, you'll be offered an "interview" (often without video from the "employer's" side) or they'll go straight to a "test task." This may include:
- Cloning a suspicious repository (often new, with few commits)
- Installing custom software according to "confidential" instructions
- Authorizing on their "corporate platform" through your personal accounts
- Providing access to your accounts "for testing integrations"
Sometimes, artificial urgency is created, for example, by stating that an access code to the system or task "is valid for a limited time."
During the process, you might be asked to provide various personal information — from OS data to authorization in your accounts supposedly "for setting up the work environment." Running the provided code or program (where a malicious element might be hidden in npm packages or obfuscated scripts) can initiate inconspicuous background activity. Authorization on their platforms through your accounts gives them full access to your data. The ultimate goal is to gain unauthorized access to your accounts, data, and in the case of cryptocurrency wallets — to your funds. After a successful attack, the "employer" usually disappears.
About Test Tasks and Working Without Upfront Payment:
Unpaid test tasks are your personal choice. Be prepared that you might not get the job after completing the task, or the task might be a way to get free work. This isn't always a scam, but the risk exists.
⚠️ Working Without Upfront Payment
Never start work without at least a partial upfront payment. This is one of the main signs of fraud. Cases where they promise "weekly payments" or "at the end of the month" and then disappear after you've done the work are a typical scam scheme.
Legitimate employers understand the value of your time and are always willing to discuss upfront payment or advance terms, especially for freelance and remote work.
How to Protect Yourself:
- Do not run unfamiliar code or software: Instead, suggest a live coding session or ask for a task that doesn't require running their files on your device.
- Thoroughly check repositories: Pay attention to a low number of commits, obfuscated (confusing) code, or inconsistency with the project description.
- Research profiles and the company: Look for information about the company and its representatives online. Check reviews and activity.
- Never use your main accounts: If a test task requires authorization, create separate test accounts without access to important data.
- Don't provide personal information: Real employers don't ask for personal information before official hiring.
- Demand upfront payment before starting work: Legitimate employers are always willing to discuss partial upfront payment terms.
- Report suspicions: If a job offer seems fraudulent, report it to the support service of the platform where you found it.
IMPORTANT: If you still need to test the code
If you still decide to test suspicious code or software, you must do it in an isolated environment: use a "sandbox" or a virtual machine that has no access to your personal data, accounts, and important files.
Scammers are constantly refining their methods, using new technologies and psychological techniques. Stay vigilant and critically evaluate every offer—this is a key step in protecting your data, accounts, and finances.
Links and Useful Resources:
- EVM Blacklist (Some scammer profiles are posted here)
- Job hunting in crypto | BEWARE OF SCAMMERS!!! How an "employer" can take all your money?! (Original in Russian)
- Cryptocurrency Job Scam Uncovered: Fake 'GrassCall' App Drains Wallets
- Trying to raise awareness on this common scam for web3 devs
- linkedin web3 fake companies interviewers try to scam you, techdevnest and techvantage