Malware-laden emails for fake job interviews

It is likely that the CrowdStrike interview email is fake.

Malware-laden emails for fake job interviews
Malware-laden emails for fake job interviews

In recent years, the tech job market has been poor, causing many individuals to intensely search for employment.

Crypto miners are being spread on people's devices by scammers posing as recruiters.

An email invitation for a job interview contains a link that installs a malicious app that secretly mines cryptocurrency, which slows down your PC's performance significantly.

person typing on laptop
A person typing on their laptop. (Kurt "CyberGuy" Knutsson)

What you need to know

An email campaign that appears to be from recruiters at CrowdStrike is the start of a malicious scheme, as reported by Dark Reading.

The email appears legitimate, but it contains a link that leads to a fraudulent website that offers a download for a supposed CRM application.

The site offers download options for both Windows and macOS, but the resulting executable, regardless of the selected option, will be a Windows executable written in Rust that downloads the XMRig cryptominer.

The executable runs environmental checks to analyze the device and evade detection. It examines running processes, inspects the CPU and more. If the device passes these checks, the executable will display a false error message while secretly downloading additional payloads required to operate the XMRig miner.

fake interview email
Fake CrowdStrike job application download. (CrowdStrike)

How does a cryptominer affect your PC?

Installing a cryptomining app on your PC can have a significant impact on its performance. The app uses your computer's resources, such as the CPU and GPU, to secretly mine cryptocurrency, which requires a lot of computational power. This can cause your system to slow down drastically, become unresponsive, run hotter than usual, and consume more power.

The prolonged use of cryptominers can cause hardware damage due to the increased strain on your components, and since they often run in the background without your knowledge, it can be difficult to detect the issue until the damage is already done.

CrowdStrike has acknowledged the scam and advises individuals to remain cautious. The company recommends verifying the authenticity of their communications and avoiding downloading any unsolicited files.

"By educating employees on phishing tactics, monitoring for suspicious network traffic, and implementing endpoint protection solutions, organizations can minimize the risk of attacks."

people on laptops
People working on their laptops. (Kurt "CyberGuy" Knutsson)

5 ways to stay safe from job interview scams

Before accepting an unsolicited interview invitation, remember to confirm if you applied for the job or company. Scammers often target jobseekers randomly, so if you didn't apply, it's likely a scam. Always double-check with the company before proceeding.

Before responding to an email or clicking any links from a recruiter, always verify their credentials by checking their email address, LinkedIn profile, and company association. Legitimate companies use official email domains, not free services like Gmail or Yahoo.

Be wary of emails requesting you to download files or applications. Legitimate recruitment processes seldom require software installation. If uncertain, contact the company to verify the request.

Before clicking on links in emails, hover over them to view their actual URL. Be cautious of scammers who use URLs that resemble legitimate sites but have slight variations. If a link appears suspicious, do not click on it.

To safeguard your device from malicious downloads, use robust antivirus or endpoint protection software. Keep your security tools up-to-date to effectively combat new threats.

To safeguard yourself from malicious links and protect your private information, it is recommended to install antivirus software on all your devices. This software can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. If you're looking for the best antivirus protection for your Windows, Mac, Android, and iOS devices in 2025, check out my top picks.

Kurt’s key takeaway

Cybercriminals are constantly devising new ways to exploit individuals, even if their current scam primarily involves using computer resources rather than stealing data. This highlights the danger of allowing hackers to install software on your PC, as they may also use it to steal your financial information and other personal data. To avoid falling victim to such scams, always verify the emails you receive and be cautious about downloading anything you don't trust.

Have you ever received a suspicious email that appeared to be a job offer? Please share your experience with us by contacting Cyberguy.com/Contact.

To receive my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter at Cyberguy.com/Newsletter.

Let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

by Kurt Knutsson, CyberGuy Report

tech

Limited space on new laptop: Tips for managing photos and videos

Limited space on new laptop: Tips for managing photos and videos

tech
Stopping robocalls on a flip phone: a guide.

Stopping robocalls on a flip phone: a guide.

tech
Malware-laden emails for fake job interviews

Malware-laden emails for fake job interviews

tech
Your credit score could be negatively impacted by these mistakes.

Your credit score could be negatively impacted by these mistakes.

tech
How to repurpose your old iPhone for a new purpose

How to repurpose your old iPhone for a new purpose

tech
The world is privy to the robot training techniques of a Chinese tech company.

The world is privy to the robot training techniques of a Chinese tech company.

tech
An early supernova was captured in photos by a powerful Webb Telescope.

An early supernova was captured in photos by a powerful Webb Telescope.

tech
A prosthetic hand controlled by a soft robotic armband allows users to move their artificial limb with ease.

A prosthetic hand controlled by a soft robotic armband allows users to move their artificial limb with ease.

tech
100 million Apple users face potential data theft due to Mac malware.

100 million Apple users face potential data theft due to Mac malware.

tech
Experience the excitement of eVTOL racing.

Experience the excitement of eVTOL racing.

tech
Company that sells Americans' location data reports massive breach, claims hackers

Company that sells Americans' location data reports massive breach, claims hackers

tech
One will leave you wanting a shape-shifting AI Transformer home.

One will leave you wanting a shape-shifting AI Transformer home.

tech
Shell's experimental big rig moves the future of trucking forward.

Shell's experimental big rig moves the future of trucking forward.

tech