A Fake Tech Company Scam: Here's How I Caught It in Time
A sophisticated scam where they offered a role to an experienced tech professional with the intention of stealing his crypto wallet credentials!
This newsletter is sponsored by DevStats.
Out Ship, Out Deliver, Out Perform.
DevStats helps engineering leaders unpack metrics, experience flow, and ship faster so every release drives real business impact.
✅ Spot bottlenecks before they stall delivery
✅ Tie dev work to business goals
✅ Ship more, miss less, prove your impact
It’s time to ship more and make your impact impossible to ignore.
Thanks to DevStats for sponsoring this newsletter. Let’s get back to this week’s thought.
Intro
With the rise of AI, there are not just upsides but also downsides.
We have seen AI cheating in interviewees, where interviewees actually change their appearance with AI and respond to questions with answers generated by ChatGPT.
If you’re interested in how to design your interview process against it, check this article:
We have also seen a rise of various different scams, some including deepfakes impersonating people, enhanced cyber attacks and various automated phishing attacks.
This story that we are going to go through today is particularly relevant for all tech professionals searching for new roles. First of all, be careful and make sure to spot the red flags as soon as possible.
There are many fake companies out there with fake roles, looking to benefit from people who are eager to contribute, so make sure to be careful.
Kjartan Manvelyan was hired for a role of technical project manager, but then it turned out that everything was fake: the people, the Slack workspace, the codebase.
All with the intention for him to download the codebase so they could do harmful things. Luckily, he found out at the right time, so no harmful things have happened.
And to make it worse, all of this happened on his birthday!
To ensure that this doesn’t happen to you and that you’ll be well-prepared if something similar occurs, Kjartan has kindly shared his experience in detail with us.
Make sure to read on.
Introducing Kjartan Manvelyan
Kjartan Manvelyan is a Fractional CTO and a seasoned tech professional. He specializes in driving impactful results across technology, team leadership, and cloud automation.
Kjartan is currently in search of a new role, so make sure to contact him while he is still available. But please, no scams!
The Sophisticated Scam
As someone who has worked as a Fractional CTO and consultant with various startups and clients across Europe for the past six years, I thought I had seen it all when it came to phishing attacks disguised as real jobs.
But nothing quite prepared me for the sophisticated scam that almost caught me on what was supposed to be the start of an exciting new role — and on my birthday, no less.
As I mentioned, this wasn't my first encounter with malicious job offers. Over the years, I've been targeted by several fake interview schemes, but this one stood out for its next-level sophistication.
The scammers had clearly refined their approach over many iterations. This was not their first rodeo.
Here's my story of how it unfolded, and more importantly, how you can protect yourself from similar threats.
Initial Contact With Recruiter
The first red flag I should have caught was how the initial contact happened.
The "recruiter" presented themselves professionally, with what appeared to be a legitimate LinkedIn profile. They spoke about a freelance role as a technical project manager in a well-funded blockchain project, a role I am qualified for and which happens to be on the current list of titles in my job search.
The job description ticked many boxes; it aligned with my background in engineering leadership, offered great compensation, and seemed like a natural fit for my skill set. And it was remote.
However, looking back, there were subtle warning signs I should have picked up on earlier. The recruiter was vague about the specific company details during our initial conversations.
I checked out the company website, which seemed legit. It was a blockchain development agency based in Estonia and Ukraine, named Omisoft. I looked them up for due diligence and verified that they were the real deal.
I also performed a WHOIS lookup on their domain name to check that it hadn’t been recently registered, as well as finding out who potentially owned the domain.
One funny incident that happened during this process was when I initially entered the domain name of the company, omisoft.net. During shady encounters like this, for security reasons, I don’t click on links sent to me - but rather open them in a Tails OS virtual machine instance.
This protects me from any potential phishing attempt, and also hides my real IP, as Tails OS is a Linux distro built to be anonymous. The first time I managed to type the URL incorrectly, which took me to a site that had no https certificate.
When I asked the recruiter about this, expressing that a missing certificate was concerning to me and if they could explain it, they corrected me and gave me the link again.
This little blunder actually made me put my guard down for a moment, and worked in the scammer's favor by moving the trust between us a little bit more to the right on the scale.
In my previous encounters with fake interviews, the scammers made the mistake of moving too quickly to the technical assessment phase, often asking me to download and run code within the first or second interaction.
It could be a Bitbucket or GitHub private repository - in the most amateur cases, a Zip file. The malicious code would be obfuscated, basically, how AI slop code can look like.
Imagine strangely named variables and code that, in general, is difficult to understand at first. After a more thorough inspection, it becomes evident that the intent is malicious, and that the only thing the code does is to steal your crypto wallet credentials and saved passwords. It can also be embedded in a web application that looks real at first, or in an installation script.
This time, the scammers were more patient, building credibility through multiple touch points before moving to the next phase. Presenting themselves as a recruiter was a smart move, and definitely brings the operation to another level.
Bear in mind, during the entire process, I am still aware I am most likely dealing with a scam. I usually don’t check all links sent to me in a sandboxed Linux instance running Tor. I am paranoid, but not that paranoid. Perhaps I should be from now on, though.
Video Interview With Sam, the Hiring Manager
After the initial chat with the recruiter on LinkedIn, next up was a call with Sam, the supposed hiring manager. The recruiter gave me a Calendly link, which is also something I have never seen used by scammers before.
I scheduled a video call. It was during my holidays on an island near the Arctic Circle in Norway, with only a mobile internet connection that sometimes could be very slow. And of course, on the morning of the interview, the network was temporarily downgraded to 100kbps due to an influx of tourists on the island.
I asked to reschedule. This was not a problem, and I booked a call the next day.
After I received the calendar invitation in my inbox, I noticed the hiring manager had tied his personal Gmail account with Calendly. Another potential red flag, but to be fair, I also use my personal email for Calendly. I am sure many others do as well.
However, by now my internal alarms had already been raised multiple times, so at this point I decided to play along till the end to see where this journey would take me. This was going to be interesting.
When our call first connected, I was surprised to see “Sam” on video in front of me, looking exactly like the photo from his Gmail account. However, the video was choppy, and within a few seconds, he asked to switch to audio-only, as “there seems to be connection problems”.
Potentially believable, as I am sure most of us have experienced having to do the same on some video calls.
Sam's lips did not seem to be moving when he was talking. The person on screen was shifting about a bit in his office chair, and since the video was also lagging, it was difficult to see much. He was on video, probably for 5-7 seconds in total, before he switched to audio.
The video was probably an AI-generated video clip from the avatar used on Sam's Gmail account. Either edited to look choppy post-generation, or it is a direct output from an AI-powered video generator, like Google's Veo3 platform.
This is what makes most sense, as it’s very unlikely Sam was using some form of network speed throttling to simulate a poor connection while actually showing his real face on camera.
I proceed on to the interview, feeling excited to get the chance to talk to a scammer for a whole half hour.
Sam starts off by presenting the project. However, he is obviously reading an AI-generated text, and it sounds a bit like a school presentation in 6th grade, reading the text with a monotonous, disinterested voice.
Add a strong Russian/Ukrainian accent on top. I am sure he has done this many times, and figured I would be bored as well. At this point, I feel some empathy for the guy. Sam sounds tired.
We then move on to relevant questions about my experience with technology and leadership. Sam shows a genuine interest in finding out how technical I am.
After going through many questions and elaborating more on my resume and experience, he seems satisfied. My feeling at the end of his questions was that I had passed their requirements. They were definitely looking for someone with technical skills.
Sam informs me they are on a quick timeline and wanted to know my earliest availability. I gave him a date, my hourly rate and was told they would get back to me soon. Sam finished off by mentioning they are only doing one interview round due to time pressure. Red flag again, but not unheard of for contract work.
After a few days, they reached out with good news: they wanted to hire me. The timeline felt kind of reasonable, not rushed like in my previous experiences.
In a chat message, Sam tells me I have to sign an NDA and tells me I will be invited to their Slack workspace next. When I read the word “Slack”, I must admit I started having some doubts again. My internal trust-o-meter started shifting towards the opposite direction.
“They have a Slack workspace? What the heck.”
Phishing information for NDA
Sam proceeds to ask me for the information needed for the NDA. They want to know a lot about me - phone number, birthdate, address, citizenship, the works.
I politely reply that I will not be providing my birthdate and some other info, as this has never been necessary previously in my career after signing many NDAs.
Sam says “ok”.
Shortly after I joined the Slack workspace, Sam messaged me again. He sends me a document, which apparently is the contract and NDA combined. This is where the red flags begin multiplying.
The document looked professional at first glance, with proper formatting and legal language, but again, I was asked to fill out my birth date and other sensitive information.
There is no tax ID/organisation number listed for the company, nor is there an address either. In my time working with EU startups and companies, every single legitimate contract has included this information.
The document is signed by “Martin Humdinger, Head of Marketplace Ops”. Below is a screenshot, along with the fake address I provided.
I proceed to Google the mysterious Martin Humdinger. Nothing comes up. The name didn't match any LinkedIn profiles or other online presence associated with the company.
I decide to ask Sam a few questions about the contract. Some of my questions were:
“Who is Martin Humdinger? I would love to speak to him.”
“The contract is missing some important info. Can you send me an updated version of the contract with the tax ID/organisation number for Omisoft, as well as the company address? This is required for tax and legal compliance.”
I also added some other questions regarding the clauses covering payments, trying to show I was still under the illusion this thing was real.
While waiting for his reply, I started looking around in Slack.
The Fake Slack
At first glance, the workspace looked convincing. There were approximately a dozen team members with kind of realistic-looking profiles, and what appeared to be a chat between a project manager and his team, who responded with status updates on their progress.
As I spent another moment to actually read the conversation, it got crazy pretty quickly.
The developers were responding to their manager with superhuman speed. Replies came within seconds or a minute or two, which simply doesn't happen in real work environments.
Even in the most effective teams I've worked with, people need time to context-switch, think through problems, actually solve the problems, and then come up with meaningful responses.
Here, you had what looks like an almost complete MVP, pretty much done in 3 minutes!
Even more telling was the language quality. Every message was written in perfect English with flawless grammar, short and efficient sentences that all shared the same style, and sophisticated punctuation like em dashes, which often is a tell that someone is using an LLM.
In my career of working with engineering teams, I've never seen such consistently perfect communication. Real workplace Slack channels are filled with typos, incomplete thoughts, emoji reactions, and probably some bad memes here and there.
The content itself felt artificial. Conversations lacked the organic flow of real team discussions. There were no inside jokes, no references to shared experiences, no technical problems people struggled with.
It read like someone had prompted an AI with "create a Slack conversation simulating blockchain engineers answering their project manager".
With just some minor improvements, this chat would be so convincing that it surely would seal the deal for many unwitting victims.
Another observation:
I also noticed a team member who had a company email listed in their bio: omisofthub.net
Running a WHOIS lookup gives us this:
As one can see, the domain was registered in June. It was clear the scammers are not affiliated with omisoft.net - otherwise they would have used that domain.
Now I had confirmation they were impersonating a legit company. Omisofthub was also the name of the Slack workspace.
I did not attempt to send an email to the listed address or chat with the AI team members. I did, however, get a response from Sam to my questions regarding the contract.
Just like that, I was kicked out of Slack and had my access removed. A week later, the Slack workspace had been suspended.
The larger pattern
I would consider this relatively sophisticated attempt the culmination of the previously mentioned experiences. Back then, the scammers made silly mistakes that made them easier to catch:
Moving too fast: Earlier scams rushed to the technical assessment phase, often asking me to download and run code within the first conversation. This latest attempt was more patient, building credibility over multiple interactions. I even had to remind them to send the Slack invitation, as I still hadn’t received it the day before my work was supposed to begin. It could be that they were too busy, but I’d like to think this was intentional.
No professional recruitment: Previous attempts skipped professional recruiters entirely, and would instead present themselves as entrepreneurs/co-founders. This time, they invested in creating a more convincing recruitment experience.
Lack of detail: Earlier attacks provided vague job descriptions and couldn't answer specific questions about the company structure or their technical challenges. While this latest attempt was still light on details, they had improved their responses. The short interview with the hiring manager did not give me enough time to gain deep insights about the project.
Malicious code repositories: In every previous case, the scammers eventually asked me to download and run a codebase locally, claiming it was for technical assessment or onboarding purposes. The code inevitably contained malware designed to steal crypto keys, saved browser passwords, or other sensitive information. This time, I didn’t get to this point due to asking too many critical questions.
Red Flags To Look For
Based on what I learned so far, here are the warning signs that should raise immediate concerns:
Recruitment red flags:
Not using a credible domain name in email exchanges. Domain names can look similar to legitimate ones, only with slightly different spellings
Vague company details or reluctance to provide specific information
Missing or unverifiable recruiter credentials (always go through the recruiter’s LinkedIn, check if their resume makes sense. Sometimes fake recruiters use stolen accounts)
Unusual urgency in the hiring process
Interview warning signs:
The interviewer doesn’t turn on their camera during the call
Fake Zoom address in the calendar invite. There is an ongoing scam now that combines Calendly with a fake Zoom call invitation, so you risk getting phished already before you even reach the interview stage
Inability to answer detailed questions about the company infrastructure or project stakeholders
Generic responses about team challenges and technical stack
Hiring managers with no verifiable online presence
If you have an actual video call, look for abnormalities in the video feed, as it could be AI-generated
Documentation issues:
Missing legal identifiers (organization numbers, proper business addresses)
Mysterious signatories with no online presence
Unusual contract clauses requesting personal security information early in the recruitment process
Requests for sensitive information unrelated to the role
Communication patterns:
Unnaturally perfect grammar and language in team communications
Lack of authentic workplace culture and personality
Generic, AI-like responses to specific questions
Protective Measures
The cybersecurity principles that protected me can help others avoid similar situations:
Always use sandboxed environments
If you must run unknown code or visit suspicious links, do so in isolated virtual machines that can't access your main systems or sensitive data. I recommend Tails OS in a VM or on a Live USB stick booted up on an old laptop you have lying around. Kali Linux works too, but make sure you are connected through Tor before you open any links. You don’t want to reveal your IP to the attacker.
Verify company information
Research tax ID numbers, business addresses, and listed employees through search engines and professional networks.
Trust your intuition
If communication patterns feel artificial or responses seem too perfect, investigate further before proceeding.
Ask specific questions
Legitimate companies can provide concrete details about their technical challenges, team structure, and business operations.
Take time for due diligence
Don't let urgency pressure you into skipping verification steps, especially for attractive opportunities.
The Evolution of Tech Scams
What made this latest attempt particularly concerning was its sophistication.
The scammers had clearly studied previous failed attempts and refined their approach. They understood that engineers are naturally suspicious of rushing to download and run an unknown codebase, so they built a more elaborate setup to establish credibility first.
I believe I was specifically targeted due to being a senior tech professional with blockchain experience.
The attackers know people with blockchain experience often have valuable digital assets and access credentials worth targeting. Unfortunately for the attackers in this particular case, I am too paranoid a person to keep any crypto credentials on my pc. That’s what we have hardware wallets for.
As these operations become more advanced, separating fake interactions from real ones will become increasingly challenging over the next years, and I also predict we will see the same level of complexity in job recruitment scams across all industries.
Verify First, Trust After Confirmation
While this experience was both scary and deeply fascinating to be part of, it shows how dangerous the current scams out there have become - and has convinced me society should brace for an impending impact.
Soon, these operations will be fine-tuned and fully tailored to the individual target, making it almost impossible to detect in time. Job seekers should tread carefully and educate themselves on basic cybersecurity principles before starting their job hunt.
The cybersecurity mindset that has served me well throughout my career — verify first, trust after confirmation, proved essential in avoiding what could have been a significant security breach.
By sharing these experiences and warning signs, I hope to help others evade similar threats.
Remember: if something feels off, it probably is.
Trust your intuition, verify everything, and never compromise your security practices for what seems like a great opportunity.
Your future self will thank you for the caution.
Still looking for that legitimate new role, by the way. But I'll definitely be keeping my guard up if you want to schedule an interview.
Last words
Special thanks to Kjartan for sharing this story with us! Make sure to check him out on LinkedIn and also if you’re team/company is looking to hire a person with a broad skillset, such as Kjartan’s, definitely contact him, but as I mentioned above, no scams!
We are not over yet!
Not Communicating Your Impact is Killing Your Career as an Engineer
I’ve seen countless engineers doing great work, but afraid to come across as if they are “bragging” or “selling”. But then, when it’s time to announce the next promotion, they get overlooked. Learn how to communicate your impact in this video.
New video every Sunday. Subscribe to not miss it here:
Liked this article? Make sure to 💙 click the like button.
Feedback or addition? Make sure to 💬 comment.
Know someone that would find this helpful? Make sure to 🔁 share this post.
Whenever you are ready, here is how I can help you further
Join the Cohort course Senior Engineer to Lead: Grow and thrive in the role here.
Interested in sponsoring this newsletter? Check the sponsorship options here.
Take a look at the cool swag in the Engineering Leadership Store here.
Want to work with me? You can see all the options here.
Get in touch
You can find me on LinkedIn, X, YouTube, Bluesky, Instagram or Threads.
If you wish to make a request on particular topic you would like to read, you can send me an email to info@gregorojstersek.com.
This newsletter is funded by paid subscriptions from readers like yourself.
If you aren’t already, consider becoming a paid subscriber to receive the full experience!
You are more than welcome to find whatever interests you here and try it out in your particular case. Let me know how it went! Topics are normally about all things engineering related, leadership, management, developing scalable products, building teams etc.
Wow :O a total eye opener.
This is worth sharing everywhere