Reading view

There are new articles available, click to refresh the page.

Fake job interview emails installing hidden cryptocurrency mining malware

The job market hasn’t been great in the last few years, especially in tech, leaving a lot of people actively looking for jobs. 

Scammers are taking advantage of this. They have come up with a new trick where they pretend to be recruiters to spread crypto miners on people’s devices. 

It starts with an email inviting the person to schedule an interview for a job. But when they click the link, it installs a malicious app that secretly mines cryptocurrency. This app hijacks your PC’s resources, like the CPU and GPU, which slows down its performance significantly.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

This malicious campaign begins with an email that tricks victims into thinking it is part of a recruitment process, as reported by Dark Reading. In most cases, these emails are pretending to be from recruiters at the cybersecurity company CrowdStrike.

The fraudulent email contains a link claiming to take the recipient to a site where they can schedule an interview. However, in reality, it redirects the victim to a malicious website that offers a download for a supposed "CRM application."

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

The site provides download options for both Windows and macOS. Regardless of which option the victim selects, the download will be a Windows executable written in Rust. This executable then downloads the XMRig cryptominer.

The executable performs several environmental checks to analyze the device and avoid detection. It scans running processes, checks the CPU and more. If the device passes these checks, the executable will display a fake error message while secretly downloading additional payloads needed to run the XMRig miner.

HERE’S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS

A cryptomining app can significantly impact your PC’s performance. Once installed, it hijacks your computer's resources, including the CPU and GPU, to secretly mine cryptocurrency. This process requires a lot of computational power, which can cause your system to slow down drastically. You might notice your computer becoming unresponsive, running hotter than usual, or consuming more power. 

In some cases, prolonged use of cryptominers can also lead to hardware damage due to the increased strain on your components. Additionally, these miners often run in the background without your knowledge, making it harder to detect the issue until the damage is already done.

CrowdStrike is aware of the scam and advises individuals to stay vigilant. "This campaign highlights the importance of vigilance against phishing scams, particularly those targeting job seekers. Individuals in the recruitment process should verify the authenticity of CrowdStrike communications and avoid downloading unsolicited files," the company said in a blog post

"Organizations can reduce the risk of such attacks by educating employees on phishing tactics, monitoring for suspicious network traffic and employing endpoint protection solutions to detect and block malicious activity."

GET FOX BUSINESS ON THE GO BY CLICKING HERE

BEWARE OF ENCRYPTED PDFS AS THE LATEST TRICK TO DELIVER MALWARE TO YOU

1. Check if you applied for the job: If you receive an unsolicited interview invitation, think back to whether you actually applied for that job or company. Scammers often target jobseekers randomly, hoping someone takes the bait. If you didn't apply, it's likely a scam. Always confirm directly with the company before proceeding.

2. Verify recruiter credentials: Always double-check the recruiter’s details before responding to an email or clicking any links. Verify their email address, LinkedIn profile and company association. Legitimate companies will use official email domains, not free services like Gmail or Yahoo.

3. Avoid downloading unsolicited files: Be cautious of emails asking you to download any files or applications. Legitimate recruitment processes rarely require you to install software. If unsure, contact the company directly to confirm the request.

4. Inspect links before clicking: Hover over any links in the email to see their actual URL. Scammers often use URLs that mimic legitimate sites but have subtle differences. If a link looks suspicious, avoid clicking on it.

5. Use strong antivirus software: Use strong antivirus or endpoint protection software to detect and block malicious downloads. Regularly update your security tools to ensure they can handle new threats effectively.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

WHAT TO DO IF YOUR BANK ACCOUNT IS HACKED

Cybercriminals always manage to come up with new ways to exploit people. While this particular scam is more focused on using your computer’s resources than stealing data, it is still very dangerous. It shows that if a hacker can easily install software on your PC, they can also go ahead and steal your financial information and other personal data. Always verify the emails you receive, and try not to download anything you don’t trust.

Have you ever received a suspicious email that looked like a job offer? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: China gains ground

IN TODAY’S NEWSLETTER:

- US must win AI race as China gains ground: 'Lead is not as big as it once was,' OpenAI exec warns
- How does AI keep the US safe amid world conflict?
- AI scammers pretending to be Brad Pitt con woman out of $850,000

AMERICA MUST WIN: OpenAI’s Chris Lehane is warning of America’s shrinking lead in the artificial intelligence space as the company releases its economic blueprint and policy proposals for the U.S.

KEEPING US SAFE: Booz Allen Hamilton CEO Horacio Rozanski unpacks global unrest in the Middle East despite the Israel-Hamas deal and the impact of artificial intelligence on defense on "The Claman Countdown."

'ONCE UPON A TIME': A happily-ever-after with someone a woman believed was Hollywood hunk Brad Pitt quickly turned into a living nightmare.

AI TRANSFORMER HOMES: AC Future, a leading developer of AI-enabled sustainable living solutions, has partnered with world-renowned Italian design house Pininfarina to create a groundbreaking collection of transformable living spaces. This innovative collaboration has resulted in three distinct products: AI-THd (AI Transformer Home Drivable), AI-THu (AI Transformer Home Unit) and AI-THt (AI Transformer Home Trailer).

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

That Apple ID disabled message? It's a dangerous scam

Let's talk about something that's been popping up in inboxes lately — those sneaky "Your Apple ID has been disabled" emails. 

Like many people who've reached out to us, you might have gotten one that looks pretty legit, saying something like, "Your Apple ID has been temporarily disabled. Verify your Apple ID Information." 

Spoiler alert: It's most likely a scam, and we're going to break down why.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

So, here's how these tricksters operate. You get an email that looks totally legit with an Apple logo and creates a sense of urgency, claiming your Apple ID is in trouble. They'll say something like, "If you do not verify your account within 48 hours, it will be permanently locked." Yikes, right? That's exactly what they want you to think. So, you'll "Click the button below to verify as soon as possible." They want you to click where it says, "Go to Apple ID."

Once you do that, you're directed to a fake Apple website designed to look almost identical to the real one. This fraudulent site prompts you to enter your username, password and other sensitive information, which the scammers can then use to access your Apple account and potentially steal your personal data or make unauthorized purchases.

NEW CYBERATTACK TARGETS IPHONE AND APPLE IDS: HERE’S HOW TO STAY SAFE

Urgent language: They're trying to scare you into acting without thinking. Classic scammer move.

Vague claims: "Missing or invalid information"? That's purposely unclear to make you doubt yourself.

Threats of lockout: Nothing like a good threat to get your heart racing, huh?

Terms of service talk: They throw this in to sound official, but it's just smoke and mirrors.

Grammar goofs: Real Apple emails are polished. Scammers? Not so much.

Fishy sender address: Always check if it's actually from @apple.com (spoiler: it's probably not). Any legitimate email from Apple will come from a domain ending in "@email.apple.com. As you can see from the scam email below, it's from a fake email: mfrasier@wavecable.com, not Apple.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

HOW TO SECURELY LOCK YOUR IPHONE AND IPAD FROM PRYING EYES

You might wonder, "Why are these scammers so obsessed with Apple IDs?" Well, there are a few reasons:

 5 THINGS TO DO FIRST IF YOU GOT A NEW MAC

To keep scammers at bay and secure your Apple ID, follow these comprehensive steps:

1. Enable Two-Factor Authentication (2FA): This crucial security feature adds an extra layer of protection to your Apple ID. Set it up by going to Settings[your name] > Sign-In & Security on your iPhone or iPad, or Apple menuSystem Settings > [your name]Sign-In & Security on your Mac.

2. Use strong passcodes: Opt for alphanumeric passcodes instead of simple PINs. When in public, use biometrics (Face ID or Touch ID) and be cautious when entering your passcode.

3. Enable Stolen Device Protection: If you're using iOS 17.3 or later, turn on this feature for additional security against theft.

4. Keep software updated: Regularly update your operating system and apps to ensure you have the latest security patches.

5. Don’t click on suspicious links, use strong antivirus software: If the email asks you to click a link, don’t do it right away. Hover over the link to see the actual URL. If it doesn’t look like an official Apple website (or any site you trust), don’t click it.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

6. Use a password manager: Generate and store strong, unique passwords for all your accounts by using a password manager.

7. Enable Find My: Turn on Find My iPhone to help locate your device if it's lost or stolen.

8. Use a personal data removal service: Consider using a service that finds and removes your personal information from data broker sites. These services can help reduce your digital footprint, making it harder for scammers to obtain your data to target you in the first place. Look for a service that offers automated removals from hundreds of data aggregators and provides detailed verification of removals.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. 

9. Don’t click on suspicious links: If the email asks you to click a link, don’t do it right away. Hover over the link to see the actual URL. If it doesn’t look like an official Apple website (or any site you trust), don’t click it.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

TOP PHONE CHARGING CABLES THAT WILL SUPERCHARGE YOUR APPLE DEVICES

Apple will never email you asking for your password or threaten to lock your account. If there's a real issue, you'll usually get a notification on your trusted device or be asked to sign in to your Apple ID account page directly. Remember, Apple will never ask for your password via email, phone or text message. Always access your account through official Apple websites or apps.

These scammers are getting craftier, but with a bit of know-how and caution, you can keep your Apple ID (and all the good stuff connected to it) safe and sound. Remember, if something feels fishy, trust your gut. When in doubt, go straight to Apple's official website or give their support team a call. Keep your digital life secure, and don't let those scammers take a bite out of your Apple.

Have you ever fallen victim to a digital scam, and what steps did you take to protect yourself afterward? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

These mistakes could tank your credit score

Do you know the difference between 550 and 780? Yes, they’re 230 digits apart, but they’re also examples of bad and good credit scores, respectively.

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

If you don’t check yours regularly, now’s the time to start. Small mistakes are a lot more common than you think, and they can do some serious damage to your credit score. I’ll let you in on some of the most common credit report mistakes and what you can do to fix them.

5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTER

Step 1: Get your free credit report

The three credit reporting agencies (TransUnion, Experian and Equifax) are required by law to provide you with one free credit report a year. Sweet. There are a few ways you can request a copy from each agency.

Online is the fastest route. If you submit a request via phone or mail, expect to wait two weeks after the paperwork is received.

Pro tip: Grab your report from the fourth credit bureau, Innovis, too.

Step 2: Look for the most common mistakes

Typos or wrong info: Anything from your name spelled incorrectly to your address or your birthdate off by one number. Tiny mistakes can mix up your credit with someone else’s.

Accounts you don’t recognize: If you see something you don’t recognize, don’t ignore it! This includes credit cards you never applied for, loans in your name or purchases you didn’t make.

Duplicates: It’s not normal to see a debt twice on a credit report. This includes things like the same collection account, transferred debts showing as separate accounts or paid-off debts still sitting there.

Incorrect account info: Sometimes, payments can mistakenly show up as late, or closed accounts may still show as active. Other times, reports may show the wrong credit limit or mess up your payment history.

AI ISN’T GOING ANYWHERE: PROMPTS TO MAKE LIFE EASIER

Outdated info: Bankruptcies older than 10 years, late payments older than seven years and outdated collections accounts should not be showing on your credit report.

Make sure websites are following your rules: How to check permissions

Step 3: Report anything strange

Don’t panic! Write down and make copies of anything that looks off, then file a dispute with the credit reporting company by mail, phone or online.

If you’re filing online or by mail, explain in writing exactly what’s wrong and why, and include copies of documents with proof. Make sure to include your contact info, credit report confirmation numbers and a copy of your version of your credit report.

And always follow up! Bureaus are required to look into your disputes within 30 days. Track its progress until you have a resolution in writing. If your dispute is valid, the bureau has to fix it and tell the other bureaus as well.

A lot of these issues boil down to good old-fashioned human error. It happens, but don’t let that stop you from taking charge.

Related: How to run a 5-minute privacy check on your phone

While you’re at it, find your job number

Equifax also runs a database of 716 million income and employment records, including, potentially, yours. It’s called The Work Number, and employers use it to make sure you are who you say you are.

Your Employment Data Report (EDR) includes things like where you’ve worked, when you worked there and your exact past salary numbers.

TECH TIP: SAVE YOUR MEMORIES BEFORE IT’S TOO LATE

Trying to get a new job? An employer could use your EDR to find your past salary range and lowball you in negotiations. And, of course, Equifax will sell your EDR to anyone who’s buying, including debt collectors. 

Money smarts: It’s not just bogus calls and emails putting your bank info at risk

How to stop it

You can freeze your EDR just like a credit report. You can also see who’s tried to access it within the past two years. You’ll need to make an account with The Work Number to do it. 

Once you register, look over your report and make sure it’s accurate. Fill out this data dispute form if you find anything fishy.

Then, head back to the dashboard and click Freeze Your Data. Fill out the Data Freeze Placement Form and submit itThe Work Number will send you a freeze confirmation letter, along with a PIN. Save your PIN in your password manager. You’ll need it if you ever want to unfreeze your report.

You can always log into The Work Number or call them to unfreeze your report.

If you can’t find your employer: They may not be registered with The Work Number. Call the freeze helpline at 1-800-367-2884 to double-check.

Unless you’re actively applying for a loan or government benefits, or unless an employer actively requests your EDR, it’s a no-brainer to freeze it. And if a potential employer insists on checking your EDR to hire you, maybe it’s not the right fit after all.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

‘The Interview’: Curtis Yarvin Says Democracy is Done

The once-fringe writer has long argued for an American monarchy. His ideas have found an audience in the incoming administration and Silicon Valley.

© Philip Montgomery for The New York Times

C.I.A.’s Chatbot Stands In for World Leaders

The spy agency is trying to give its teams better tools and make it easier for the private sector to develop technology for their secretive work.

© Jason Andrew for The New York Times

Nand Mulchandani, who helped found a series of successful start-ups before joining the Pentagon’s artificial intelligence center, is the C.I.A.’s first chief technology officer.

Biden and Trump Weigh In as TikTok Threatens to ‘Go Dark’ on Sunday

The Chinese-owned company said it would cut off its services unless the U.S. assures Apple, Google and other companies that they would not be punished for hosting and distributing TikTok.

© David Swanson/Reuters

TikTok has said its service will “go dark” for its 170 million American users on Sunday in the face of a federal ban.

U.S. Ban of TikTok Is Set to Deal a Major Blow to ByteDance, Its Chinese Owner

While TikTok remains hugely popular in Brazil, Indonesia and other markets, its 170 million users in the United States are its most valuable.

© Caroline Gutman for The New York Times

The Supreme Court last week heard oral arguments over the federal law to ban TikTok in the United States.

Instagram and YouTube Prepare to Benefit From a TikTok Ban

Meta’s Instagram and Google’s YouTube are getting ready to welcome TikTok users, as the Supreme Court upheld a law that effectively bans the Chinese-owned app from the United States.

© Jason Henry for The New York Times

Meta, which owns Instagram, would most likely benefit from a ban of TikTok.

Russian Disinformation Campaigns Eluded Meta’s Efforts to Block Them

A new report details how a covert influence operation linked to the Kremlin continued to place ads on Facebook despite U.S. and E.U. prohibitions on doing business with the organization.

© Maxim Shipenkov/EPA, via Shutterstock

Ads linked to Russian covert influence campaigns were placed by the Social Design Agency, a public relations company in Moscow.

Spain Overhauls Domestic Violence System After Criticism

Spain uses an algorithm to score how likely a domestic violence victim is to be abused again. A Times investigation last year identified flaws in the system.

© Ana Maria Arevalo Gosen for The New York Times

Screens showing the VioGén system used by the military police in Seville, Spain.

When the Word Is Not Just Flesh: Reporting on A.I. in Religion

By: Eli Tan
A technology reporter came across a Facebook group called “A.I. for Church Leaders and Pastors,” and his interest was piqued.

© Michael Starghill Jr. for The New York Times

Rabbi Oren Hayon, standing, and Rabbi Josh Fixler use artificial intelligence programs in their roles as faith leaders.

What to Know About Plane Maintenance After the South Korean Crash

Airlines have been increasingly outsourcing repair and upkeep work to other countries, but experts and consumer groups disagree about its impact on safety.

© Lucy Hewett for The New York Times

Every part of a plane, down to the nuts and bolts, is subjected to routine inspections, repair or replacement.

Apple Plans to Disable A.I. Summaries of News Notifications

The company’s Apple Intelligence system has erroneously characterized news stories, provoking a backlash from media companies.

© Jim Wilson/The New York Times

The flawed summaries feature is the latest in a series of issues that have marred new A.I. products.
❌