Catching the ghost in the machine: Adapting threat detection to cloud speed
January 11, 2025
Why Private AI is becoming the preferred choice for enterprise AI deployment
January 12, 2025

Recruitment Phishing Scam Imitates CrowdStrike Hiring Process

A newly discovered phishing campaign uses CrowdStrike recruitment branding to convince victims to download a fake application, which serves as a downloader for the XMRig cryptominer.

On January 7, 2025, CrowdStrike uncovered a phishing campaign that misused its recruitment branding to distribute malware disguised as an "employee CRM application." The campaign starts with phishing emails impersonating CrowdStrike's recruitment team, luring recipients to a fraudulent website. There, victims are encouraged to download and execute a counterfeit application, which functions as a downloader for the XMRig cryptominer.
 
 

How the Scam Works

Blog-RecruitmentPhish-Code1

This file contains configuration information for XMRig in the form of command-line arguments that can be appended to a call to the XMRig miner executable.

Once the basic environment checks are completed and the fake error message is displayed, the executable proceeds to download a text file from the URL:

Blog-RecruitmentPhish-Code2

The executable then downloads a copy of XMRig from GitHub, from the URL:

Blog-RecruitmentPhish-Code3

The downloaded ZIP file is saved to the following path:

Blog-RecruitmentPhish-Code4

The executable extracts the contents of the ZIP file into the %TEMP%\System\ directory and copies the main XMRig executable to the path:

Blog-RecruitmentPhish-Code5

The malware then runs the XMRig miner, using the command-line arguments inside the downloaded configuration text file:

The executable establishes persistence via the following methods:
Blog-RecruitmentPhish-Code6

Drops a Windows batch script to the Start Menu Startup directory, at this path:

Blog-RecruitmentPhish-Code7

This batch script executes a dropped copy of the downloaded miner, located at:

The downloaded executable performs several environment checks to evade detection and analysis before downloading additional payloads. These checks include:

  • Detecting if a debugger is attached to the process using the IsDebuggerPresent Windows API
  • Ensuring the system has a minimum number of active processes
  • Verifying that the CPU has at least two cores
  • Scanning the list of running processes for common malware analysis or virtualization software tools, avoiding execution in sandboxed or monitored environments

 

If these checks are passed, the executable displays a fake error message pop-up before continuing.

 
Blog-RecruitmentPhish-Code8

The contents of the batch script are the following:

Blog-RecruitmentPhish-Code9

The batch script writes a new Windows Registry logon autostart key, located at:

Blog-RecruitmentPhish-Code10

This logon autostart entry executes a dropped copy of the original malicious downloader, located at:

This campaign highlights the importance of vigilance against phishing scams, particularly those targeting job seekers. Individuals in the recruitment process should verify the authenticity of CrowdStrike communications and avoid downloading unsolicited files. Organizations can reduce the risk of such attacks by educating employees on phishing tactics, monitoring for suspicious network traffic and employing endpoint protection solutions to detect and block malicious activity.

Outside of this campaign, we are aware of scams involving false offers of employment with CrowdStrike. Fraudulent interviews and job offers use fake websites, email addresses, group chats and text messages. We do not interview prospective candidates via instant message or group chat, nor do we require candidates to purchase products or services, or process payments on our behalf, as a condition of any employment offer. And, in reference to the campaign detailed above, we do not ask candidates to download software for interviews.

Those interested in applying for a role at CrowdStrike should navigate to our Careers page to learn about our job openings and begin our official application process. To verify the authenticity of CrowdStrike recruitment communications, please reach out to recruiting@crowdstrike.com.

The phishing site, cscrm-hiring[.]com, serves as the base for the attack, hosting the malicious executable and directing victims to download the fake CRM application. The malware establishes its presence by executing in the background, using minimal CPU resources to avoid detection. Key indicators include specific file paths, registry entries and network communication.

Network Indicators

Indicator Description
cscrm-hiring[.]com Domain of phishing site
https[:]//cscrm-hiring[.]com/cs-applicant-crm-installer[.]zip URL serving malicious executable
93.115.172[.]41 IP used for Threat Actor Pool and data
http[:]//93.115.172[.]41/private/aW5zdHJ1Y3Rpb25zCg==.txt Text data containing XMRig parameters
93.115.172[.]41:1300 Mining Pool hosted by threat actor

A newly discovered phishing campaign uses CrowdStrike recruitment branding to convince victims to download a fake application, which serves as a downloader for the XMRig cryptominer.