Keepnet Labs Logo
Menu
HOME > blog > unmasking a sophisticated job scam in 2025

Unmasking a Sophisticated Job Scam in 2025

A job scam impersonated Keepnet and used LinkedIn, Google Meet, and Slack to deceive job seekers. Learn how it unfolded and how to recognize the red flags.

Unmasking a Sophisticated Job Scam Using Trusted Platforms

A highly sophisticated job scam has recently surfaced, targeting individuals looking for a job. What makes this scam so alarming is its use of trusted professional platforms—including LinkedIn, Google Meet, and Slack—to build an illusion of legitimacy. Even more audaciously, these scammers have falsely adopted the Keepnet brand in an attempt to appear reputable.

This article dissects the scam at every stage, exposing the red flags and Indicators of Compromise (IOCs) that can alert potential victims. Given the rapid growth in crypto-related jobs and the industry’s global, decentralized nature, job seekers need to remain vigilant and conduct due diligence before sharing personal or financial information.

Below is a comprehensive breakdown of how the fraud unfolds, what warning signs to look for, and how to protect yourself from falling prey.

The Scam Breakdown

Here is the step-by-step breakdown of the scam, outlining the typical sequence of events and interactions that victims experience.

1. LinkedIn Connection and Initial Contact

The scam typically begins with a LinkedIn connection request from what appears to be a professional profile. In the documented case, Serdest Onat received a request from a user named George Lin. After the victim accepted, George followed up with a friendly message, likely tailored to appeal to the victim’s professional background in cryptocurrency.

The use of LinkedIn—a platform synonymous with professional networking—encourages trust.

LinkedIn message from George
Image 1: LinkedIn message from George

2. Google Meet Interview with “Roman”

Once the connection is established, the scammer suggests a Google Meet call under the guise of a formal interview. This video call further legitimizes the process:

  • Roman conducts the interview, speaking fluent English and appearing polished and professional.
  • He requests the victim turn on their camera—a common practice in legitimate interviews to foster a personal connection.

This step is often enough to persuade the unsuspecting individual that they are dealing with a legitimate recruiter or HR representative, especially when they see a real person on the screen. However, these scammers rely on this fleeting credibility to distract from glaring inconsistencies—such as mismatched email domains or the suspiciously rapid pace of “hiring.”

Google Meeting with Attacker
Image 2: Google Meeting with Attacker

3. Fake Job Offer via Email

Following the interview, the scammer sends an email from a generic Gmail address (e.g., angel126mic@gmail.com), attaching or linking to a Google Form. The email outlines a “job offer,” instructing the recipient to fill out personal information like name, contact details.

Attacked Sends Fake Google Forms via Email
Image 3: Attacked Sends Fake Google Forms via Email

4. Slack Channel Invitation

In the final stage, the victim is invited to a Slack workspace supposedly affiliated with Keepnet. Once inside, they communicate with a user named Dhanh Tanh Ngo, whose profile photo is the same individual who appeared on Google Meet under the name “Roman.”

Slack is widely recognized as a leading collaboration tool, which makes this step especially deceptive. Victims might believe they are simply joining their new team’s workspace to finalize onboarding. In reality, they are stepping deeper into the scammer’s well-crafted trap.

Fake Slack invitation - https://keepnetlabs-llc.slack.com/
Image 4: Fake Slack invitation - https://keepnetlabs-llc.slack.com/

After scammer's LinkedIn profile who started initial conversation with victim, the personed seemd based UK, but after we taled to JobSecta company that we understood this person based in Singapore and worked for Jobsecta in the past and not actively working with them.

The scammer, who initiated contact with the victim via LinkedIn, appeared to be based in the UK. However, after contacting the JobSecta company, it was discovered that this person was actually based in Singapore and had worked for JobSecta in the past, but was not currently employed by them.

Key Red Flags and Indicators of Compromise (IOCs)

Let’s dive into the most suspicious elements and warning signs that were present in this scam, which can be used to identify similar scams in the future:

1. Email Address

  • angel126mic@gmail.com
  • roman.shalak12@gmail.com

These are personal Gmail accounts, not tied to an official company domain.

2. LinkedIn Profile Anomalies

  • George Lin’s profile claims to be in the UK but shows ties to Singapore. Discrepancies in location and background often point to fabricated identities.

3. Unusual Tactics

  • Rapid Escalation: Jumping from a LinkedIn chat to a video interview, followed immediately by a Slack workspace, is atypical for legitimate companies, especially without multi-step interviews or background checks.
  • Rapid Escalation: Jumping from a LinkedIn chat to a video interview, followed immediately by a Slack workspace, is atypical for legitimate companies, especially without multi-step interviews or background checks.

Why This Scam Stands Out

The bold misuse of the Keepnet brand, coupled with the abuse of trusted platforms like LinkedIn and Slack, makes this scam particularly noteworthy. Adding to the concern is the scammer's focus on cryptocurrency, exploiting its untraceable nature for quick, illicit gain:

1. Misuse of the Keepnet Brand

One notable twist is the fraudulent usage of “Keepnet”—a genuine cybersecurity company—to add legitimacy. By co-opting Keepnet name and referencing their services, scammers hope to reassure prospective victims. Ironically, using a cybersecurity brand for criminal activity underscores the scammers’ brazen nature.

2. Abuse of Established Platforms

This scheme takes advantage of trusted online platforms, including LinkedIn, Google Meet, and Slack. Each platform’s credibility assists the scammer in masking fraudulent behavior. Victims may become less suspicious simply because they recognize and regularly use these reputable tools.

Psychological Tactics at Play

Scammers employ a variety of psychological tactics to manipulate their victims. Some of the most common tactics include:

1. Professional Presentation

A slick Google Meet interview with a camera-enabled conversation creates an instant aura of authenticity.

2. Urgency & Exclusivity

The promise of a high-paying role or urgent need for a specialized skill in cryptocurrency can override initial skepticism.

3. Overlapping Identities

Using the same face (“Roman”) across email, Slack, and video calls provides consistency that initially builds trust.

Protecting Yourself From Job Scams

1. Verify Through Official Channels

When you receive a job offer, always confirm by contacting the company directly via their official website or verified phone number. For instance, Keepnet’s egitimate domain is keepnetlabs.com—anything else is suspicious.

2. Check Email Domains

Legitimate companies typically use @companyname.com email addresses. Be wary of offers from Gmail, Yahoo, or other free email services.

3. Report Suspicious Activity

Flag questionable profiles on LinkedIn, Slack, or email as soon as you suspect fraud. Reporting helps prevent others from becoming victims.

4. Look for Inconsistencies

Mismatched locations, unprofessional communication, and immediate transitions to Slack with no formal HR steps are all red flags.

As cryptocurrency adoption expands, so does cybercrime focusing on digital assets. This scam is part of a larger wave of frauds leveraging trusted platforms and well-known industry brand names to target unsuspecting victims. Whether you’re a seasoned crypto enthusiast or exploring digital assets for the first time, remaining educated and cautious is essential.

Check out our blog on 2025 common phishing scam examples to learn more.

How Keepnet Human Risk Management Combats Social Engineering Scams

In 2025, cybercriminals exploit trusted platforms like LinkedIn, Google Meet, and Slack to launch sophisticated scams, Keepnet Human Risk Management emerges as a critical defense. By addressing human vulnerabilities—the weakest link in cybersecurity—Keepnet empowers organizations to proactively mitigate risks through a multi-layered approach.

  • Security Awareness Training: Keepnet’s adaptive security training programs educate employees on identifying red flags in social engineering tactics, such as unsolicited cryptocurrency requests or fake job offers. Training modules include real-world examples of hijacked brands, spoofed communication channels, and urgency-driven scams, fostering a culture of skepticism and critical thinking. Employees learn to see anomalies in emails, meetings, or collaboration tools, transforming them into vigilant first responders.
  • Phishing Simulations: Keepnet goes beyond theory with hyper-realistic phishing simulations that replicate current threat patterns, including AI-generated fraudulent video calls, and cloned corporate websites. These exercises test employee readiness in a controlled environment, providing actionable insights into gaps in detection and response. Over time, repeated exposure reduces susceptibility to social engineering by reinforcing muscle memory for safe practices.

By combining awareness education, hands-on practice, and real-time protection, Keepnet Human Risk Management transforms human behavior from a liability into a shield. In a landscape where scams evolve daily, organizations equipped with these tools not only react to threats but anticipate them, ensuring trust in digital interactions remains intact.

SHARE ON

twitter
linkedin
facebook

Schedule your 30-minute demo now

You'll learn how to:
tickTrain employees to detect phishing tactics in job-related scams and social engineering ploys.
tickCustomize simulations that reflect real-world fraud like fake recruiter emails.
tickMonitor click rates and risk scores to improve your company’s human firewall.