How Browser Wallet Permissions Were Exploited in the Latest LinkedIn Job Offer Scam
A crypto investor lost a significant amount of digital assets after falling for a sophisticated phishing scam disguised as a LinkedIn job interview. While applying for jobs on LinkedIn, the victim was approached with a fake job offer by a ‘recruiter’ claiming to represent a top Web3 company. What began as a standard job application process quickly turned into a costly mistake.
After some standard back-and-forth, the recruiter sent a link for a test interview. Pressed by the countdown timer and misled by technical prompts, the victim unknowingly enabled permissions that exposed their browser wallet.
The result was a full compromise. The attacker drained the investor’s Ethereum (ETH), Solana (SOL), and several high-value NFTs, including collectibles from the Azuki and BEANZ series.
Social Engineering Tactics Now Target Wallet Permissions
Unlike traditional hacking methods, attackers are increasingly exploiting trust through social engineering. In this case, it wasn’t malware or brute force that enabled the theft—it was carefully crafted interaction.
This LinkedIn scam shows the importance of separating job-hunting from financial activity. Changpeng Zhao, former CEO of Binance, has warned users to use a separate device for wallet activity to avoid granting risky permissions or installing unsafe apps.
Lesson here: Use a separate computer for your wallet and avoid installing or granting permissions.
Though inconvenient, it prevents costly hacks, which are more common than reported. Sharing like this 👇requires courage.
Stay SAFU! https://t.co/gBfSegmBwJ
— CZ 🔶 BNB (@cz_binance) May 1, 2025
April Sees $364M in Crypto Scams: A 1,163% Spike
The job interview scam is just one of many attacks that plagued April. According to CertiK, in April alone, losses from scams, hacks, and exploits surged to $364 million, up 1,163% from March’s $28.8 million.
#CertiKStatsAlert 🚨
Combining all the incidents in April we’ve confirmed ~$364M lost to exploits, hacks and scams after ~$18.2m was returned.
KiloEx, Loopscale and zkSync all had funds returned by whitehat exploiters.
~$337M of the total is attributed to phishing.
More… pic.twitter.com/0GBcSZgdPB
— CertiK Alert (@CertiKAlert) April 30, 2025
A single event was responsible for most of the damage: an elderly American investor was swindled out of 3,520 Bitcoin, worth over $330 million. However, even excluding that case, April still saw a 21% rise in malicious activity over the previous month.
White Hats Recover Over $18 Million
Despite the surge in attacks, white hat hackers and security teams managed to recover $18.2 million in stolen funds. One major recovery involved KiloEx, a decentralized exchange exploited through oracle price manipulation. Binance’s security team and others quickly responded, tracking the attacker and recovering 90% of the stolen $7.5 million.
ZKsync and Loopscale also successfully negotiated partial recoveries with attackers who accepted 10% white-hat bounties.