‘OpenAI’ Job Scam Targeted International Workers Through Telegram

[ad_1]

“Regrettably, I found no available source online to know more about this organization except for those registrations,” wrote the complainant. “They are collecting huge amounts of investment from third world countries in Asia.”

Build a website that pays you back with real revenue.

One of the FTC complaints alleges that over 6,000 people in Bangladesh were potentially impacted by the OpenAi-etc job scam. The ages listed in the FTC complaints range from teenagers to people in their fifties, with locations spread across multiple Bangladesh cities, from Dhaka to Khulna.

“My next trading date was 29 August, 2024,” wrote another complainant. “I made the trade with my whole amount in the evening. But, suddenly, the OpenAI company vanished. I didn’t withdraw any money but lost both capital and profit. Now, I am in a great economic crisis, as I am a normal school teacher.”

Niko Felix, a spokesperson for OpenAI, declined to answer questions about whether the startup was previously aware of the “OpenAi-etc” scam, or if they planned to take action against the fraudsters. But he did share that OpenAI is investigating the matter. The alleged scam website is no longer available online, and WIRED was not able to contact the people behind “OpenAi-etc” prior to publication.

A Telegram spokesperson using the name Remi Vaughn tells WIRED that the company monitors its platform for scams, such as those allegedly carried out by OpenAi-etc, which used the messaging app to communicate with people who believed they were working for the company.

“Telegram actively moderates harmful content on its platform, including scams,” Vaughn says in a statement sent to WIRED through the messaging platform. “Moderators empowered with custom Al and machine learning tools proactively monitor public parts of the platform and accept reports from users and organizations in order to remove millions of pieces of harmful content each day.”

See also  The Anonymous YouTubers Street-Racing Through New York

The usual pattern of a crypto job scam is to trick people into depositing some kind of digital currency into a fake account the victim believes they have control over, until the perpetrator drains it one day without warning. While this specific rug pull used OpenAI’s branding to allegedly dupe its victims, a crypto job scam can happen with the name of any company that has enough widespread recognition for criminals to capitalize on.

“These social engineering scams are designed to lower our natural suspicion and to make us complicit in our own deception,” says Arun Vishwanath, a cybersecurity expert and author of The Weakest Link. “For job scams, they try to turn our ambitions and inherent trust in brands into a vulnerability.” Similar to so-called pig butchering investment scams, a key component often includes direct messages over a long period of time to cultivate a sense of trust with the targets.

Although comparable job scams happen all over the world, Vishwanath believes that Asian cultural norms of so-called high power distance, where there’s more acceptance of interpersonal hierarchies, are a contributing factor. “Authorities are expected to ask you things and make you do things,” he says. “And you just comply.” Scammers are taking advantage of this by imitating authority figures and leaning into the sense of urgency inherent to searching for a job.

Bangladeshi citizens on the difficult hunt for reliable work have increasingly been targeted by job scammers in recent years. Lies about international job opportunities have left throngs of would-be workers stranded in Malaysia, and at least three cases of kidney organ theft were reported by people lured to India with false promises of work.

See also  5 Active Malware Campaigns in Q1 2025

[ad_2]

Source link

Related posts:

Stay Safe Online: Essential Tips for Safer Internet Day

Technology

Is Your Phone Your Best Friend or a Silent Spy?

Technology

Wipe Your Digital Footprints with Data Wipe Software

Technology

No, you’re not fired – but beware of job termination scams

Technology

DeceptiveDevelopment targets freelance developers

Technology

Fake job offers target coders with infostealers

Technology

Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware

Technology

LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile

Technology

CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation

Technology

Malicious PyPI Package "automslc" Enables 104K+ Unauthorized Deezer Music Downloads

Technology

CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries

Technology

Three Password Cracking Techniques and How to Defend Against Them

Technology

New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems

Technology

SOC 3.0 - The Evolution of the SOC and How AI is Empowering Human Talent

Technology

Leaked Black Basta Chat Logs Reveal $107M Ransom Earnings and Internal Power Struggles

Technology

Microsoft: Russian-Linked Hackers Using 'Device Code Phishing' to Hijack Accounts

Technology

AI-Powered Social Engineering: Ancillary Tools and Techniques

Technology

Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks

Technology

New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution

Technology

Android's New Feature Blocks Fraudsters from Sideloading Apps During Calls

Technology

New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations

Technology

⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More

Technology

CISO's Expert Guide To CTEM And Why It Matters

Technology

South Korea Suspends DeepSeek AI Downloads Over Privacy Violations

Technology

Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics

Technology

Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment Skimmers

Technology

New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials

Technology

Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign

Technology

Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication

Technology

Debunking the AI Hype: Inside Real Hacker Tactics

Technology

Build a website that pays you back with real revenue.

Leave a Reply

Your email address will not be published. Required fields are marked *

×