Connect with us

Technology

Teen hackers recruited through fake job ads

Published

on

Teen hackers recruited through fake job ads

NEWYou can now listen to Fox News articles!

At first glance, the job posts look completely harmless. They promise fast money, flexible hours and paid training. No experience required. Payment comes in crypto. But these are not tutoring gigs or customer service roles. They are recruiting ads for ransomware operations. 

And many of the people responding are middle and high school students. Some posts openly say they prefer inexperienced workers. Others quietly prioritize young women. All of them promise big payouts for “successful calls.”

What they leave out is the risk. Federal charges. Prison time. Permanent records. This underground ecosystem goes by a familiar name. Insiders often refer to it as “The Com,” short for “The Community.”

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS

Fake job ads promising fast cash and flexible hours are quietly recruiting teens into ransomware and extortion schemes, often paying in cryptocurrency to hide criminal activity. (Donato Fasano/Getty Images)

How The Com operates behind the scenes

The Com is not a single organized gang. It functions as a loose network of groups that regularly change names and members. Well-known offshoots tied to this ecosystem include Scattered Spider, Lapsus$, ShinyHunters and related splinter crews. Some groups focus on data theft. Others specialize in phishing or extortion. Collaboration happens when it benefits the operation. 

Since 2022, these networks have targeted more than 100 major companies in the U.S. and UK. Victims include well-known brands across retail, telecom, finance, fashion and media, including companies such as T-Mobile, Nike and Instacart. The combined market value of affected companies exceeds one trillion dollars.

Teenagers often take on the riskiest roles within these schemes. Phone calls, access testing and social engineering scripts typically fall to younger participants. More experienced criminals remain in the background, limiting their exposure.

Advertisement

That structure mirrors what identity and fraud experts are seeing across the industry. Ricardo Amper, founder and CEO of Incode Technologies, a digital identity verification company, says fake job ads are effective because they borrow trust from a familiar social contract. 

“A job post feels structured, normal and safe, even when the actual behavior being requested is anything but,” Amper said. “A job posting implies a real process – a role, a manager, training and a paycheck. That’s exactly why it works. It lowers skepticism and makes risky requests feel like normal onboarding.”

Amper notes that what’s changed is not just the scale of recruitment, but how criminals package it. “Serious crime is now being sold as ‘work.’”

Why teens excel at social engineering attacks

Teenagers bring a unique mix of skills that make them highly convincing. Fluent English and comfort with modern workplace technology help them sound legitimate. Familiarity with tools like Slack, ticketing systems and cloud platforms makes impersonation easier.

According to Amper, teens don’t need technical expertise to get pulled in. “The on-ramp is usually social, a Discord server, a DM, a ‘quick gig,’” he said. “It can feel like trolling culture, but the targets are real companies and the consequences are real people.”

Advertisement

Risk awareness is often lower. Conversations frequently take place in public chats, where tactics and mistakes are shared quickly. That visibility accelerates learning and increases the likelihood of detection and arrest.

Gaming culture feeds the pipeline

For many teens, it starts small. Pranks in online games turn into account takeovers. Username theft becomes crypto theft. Skills escalate. So do the stakes.

Recruitment often begins in gaming spaces where fast learning and confidence are rewarded. Grooming is common. Sextortion sometimes appears. By the time real money enters the picture, legal consequences feel distant.

Amper compares the progression to gaming itself. “These crews package crime as a ladder,” he said. “Join the group, do small tasks, level up, get paid, get status.”

Why young women are being targeted

Cybercrime remains male-dominated, but recruiters adapt. Young women are increasingly recruited for phone-based attacks. Some use AI tools to alter accents or tone. Others rely on stereotypes. Distress lowers suspicion faster than authority. Researchers say women often succeed because they are underestimated. That same dynamic puts them at risk inside these groups. Leadership remains overwhelmingly male. Girls often perform low-level work. Training stays minimal. Exploitation is frequent.

Advertisement

Red flags that signal fake job scams and ransomware recruitment

These warning signs show up repeatedly in cases involving teen hackers, social engineering crews and ransomware groups.

Crypto-only pay is a major warning sign

Legitimate employers do not pay workers exclusively in cryptocurrency. Crypto-only pay makes transactions hard to trace and protects criminals, not workers.

Per-call or per-task payouts should raise concern

Promises of hundreds of dollars for a single call or quick task often point to illegal activity. Real jobs pay hourly or a salary with documentation.

Recruitment through Telegram or Discord is a red flag

Criminal groups rely on private messaging apps to avoid oversight. Established companies do not recruit employees through gaming chats or encrypted DMs.

Anonymous mentors and vague training are dangerous

Being “trained from scratch” by unnamed individuals is common in ransomware pipelines. These mentors disappear when arrests happen.

Advertisement

Secrecy requests signal manipulation

Any job that asks teens to hide work from parents or employees to hide tasks from employers is crossing a line. Secrecy protects the recruiter, not the recruit.

Amper offers a simple rule of thumb: “If a ‘job’ asks you to pretend to be someone else, obtain access, move money, or share sensitive identifiers before you’ve verified the employer, you’re not in a hiring process. You’re in a crime pipeline.”

He adds that legitimate employers collect sensitive information only after a real offer, through verified HR systems. “The scam version flips the order,” he said. “It asks for the most sensitive details first, before anything is independently verifiable.”

Urgency and emotional pressure are deliberate tactics

Rushing decisions or creating fear lowers judgment. Social engineering depends on speed and emotional reactions.

If you see more than one of these signs, pause immediately. Walking away early can prevent serious legal consequences later.

Advertisement

MICROSOFT TYPOSQUATTING SCAM SWAPS LETTERS TO STEAL LOGINS

Cybercrime recruiters are targeting middle and high school students for risky roles like social engineering calls, exposing them to federal charges and prison time. (Philip Dulian/picture alliance via Getty Images)

Law enforcement is cracking down on teen cybercrime

Since 2024, government indictments and international arrests have shown cybercriminal groups tied to The Com and Scattered Spider are under increasing scrutiny from law enforcement. In Sept. 2025, U.S. prosecutors unsealed a Department of Justice complaint against 19-year-old Thalha Jubair, accusing him of orchestrating at least 120 ransomware and extortion attacks that brought in over $115 million in ransom payments from 47 U.S. companies and organizations, including federal court networks. Prosecutors charged Jubair with computer fraud, wire fraud and money laundering conspiracy.

Across the Atlantic, British authorities charged Jubair and 18-year-old Owen Flowers for their alleged roles in a Transport for London cyberattack in 2024 that compromised travel card data and disrupted live commuter information. Both appeared in court under the U.K.’s Computer Misuse Act. Earlier law enforcement action in the U.S. included criminal charges against five Scattered Spider suspects for mass phishing campaigns that stole login credentials and millions in cryptocurrency, laying out how members of this collective staged coordinated extortion and data theft.

Federal agencies are also issuing advisories about the group’s social engineering techniques, noting how attackers impersonate help desks, abuse multi-factor authentication and harvest credentials to access corporate networks.

Advertisement

Parents often learn the truth late. In many cases, the first warning comes when federal agents arrive at the door. Teens can move from online pranks to serious federal crimes without realizing where the legal line lies.

How parents and teens can avoid ransomware recruitment traps

This type of cybercrime thrives on silence and speed. Slowing things down protects families and futures.

Tips for parents and guardians to spot fake job scams early

Parents play a critical role in spotting early warning signs, especially when online “work” starts happening behind closed doors or moves too fast to explain.

1) Pay attention to how online “jobs” are communicated

Ask which platforms your child uses for work conversations and who they talk to. Legitimate employers do not recruit through Telegram or Discord DMs.

Advertisement

2) Question sudden income with no clear employer

Money appearing quickly, especially in crypto, deserves scrutiny. Real jobs provide paperwork, supervisors and pay records.

3) Treat secrecy as a serious warning sign

If a teen is told to keep work private from parents or teachers, that is not independence. It is manipulation.

4) Talk early about legal consequences online

Advertisement

Many teens do not realize that cybercrime can lead to federal charges. Honest conversations now prevent life-changing outcomes later. Also, monitoring may feel uncomfortable. However, silence creates more risk.

Tips for teens to avoid fake job offers and cybercrime traps

Teenagers with tech skills have real opportunities ahead, but knowing how to spot fake offers can mean the difference between building a career and facing serious legal trouble.

1) Be skeptical of private messages offering fast money

Real companies do not cold-recruit through private chats or gaming servers.

2) Avoid crypto-only payment offers

Advertisement

Being paid only in cryptocurrency is a common tactic used to hide criminal activity.

3) Choose legal paths to build skills and reputation

Bug bounty programs, cybersecurity clubs and internships offer real experience without risking your future. Talent opens doors. Prison closes them.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

Advertisement

FBI WARNS OF FAKE KIDNAPPING PHOTOS USED IN NEW SCAM

A loose cybercrime network known as “The Com” has been linked to major U.S. and U.K. data breaches affecting companies worth trillions combined. (Photo by Uli Deck/picture alliance via Getty Images)

Kurt’s key takeaways

What makes this trend so unsettling is how ordinary it all looks. The job ads sound harmless. The chats feel friendly. The crypto payouts seem exciting. But underneath that surface is a pipeline pulling teenagers into serious crimes with real consequences. Many kids do not realize how far they have gone until it is too late. What starts as a quick call or a side hustle can turn into federal charges and years of fallout. Cybercrime moves fast. Accountability usually shows up much later. By the time it does, the damage is already done.

If fake job ads can quietly recruit teenagers into ransomware gangs, how confident are you that your family or workplace would spot the warning signs before it is too late? Let us know by writing to us at Cyberguy.com.

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com.  All rights reserved.

Advertisement

Technology

The best deals on MacBooks right now

Published

on

The best deals on MacBooks right now

Apple currently sells MacBooks equipped with its own M-series processors in a wide range of sizes and price points, all of which run the company’s newest operating system, macOS 26. Purchasing a new MacBook can be complicated if you’re trying to figure out what specs you need, but finding a deal on a relatively speedy model is surprisingly easy, especially since Apple increased the starting RAM on several models in late 2024.

These days, it’s not uncommon to see various MacBooks discounted by up to $800. Alternatively, purchasing refurbished options directly from Apple is another way to save money without waiting for the changing deal winds to blow your way. It’s also the only option to find certain configurations of older models as Apple continues to move forward with newer releases. Apple’s refurbished store offers a one-year warranty and generally discounts new units by up to 20 percent.

But if you want to buy new and you’re looking to save whatever you can, here are the best MacBook Air, MacBook Pro, and Mac Mini deals available.

The best MacBook Air deals

In March, Apple released an updated MacBook Air, which comes in both a 13- and 15-inch configuration with an M4 processor. Interestingly, the latest Air starts at a lower price than the prior model, yet it offers slightly faster performance and twice as much base RAM at 16GB. It can also connect to two external monitors with the lid open, comes in a fresh sky blue color, and features the 12-megapixel Center Stage webcam from the latest MacBook Pro. Needless to say, there’s a lot to like.

Advertisement

Both the 13-inch and 15-inch MacBook Airs are currently receiving some sizable discounts, too. You can pick up the 13-inch base model with a 10-core CPU, an eight-core GPU, 16GB of RAM, and 256GB of storage on sale at Amazon and Best Buy for around $799 ($200 off), which is just $50 shy of its lowest price to date. If you prefer the larger 15-inch model, the entry-level configuration with a 10-core GPU, 16GB of RAM, and 256GB of storage is on sale for about $999 ($200 off) at Amazon and Best Buy, which remains its second-best price to date.

The M4 MacBook Air sitting on a table in front of a plant.The M4 MacBook Air sitting on a table in front of a plant.

The best MacBook Pro deals

M4 and M4 Pro MacBook Pro

In November 2024, Apple released the M4-series MacBook Pro. Notably, the base 14-inch M4 MacBook Pro is the first to launch with 16GB of RAM — double the previous generation’s starting memory — and 512GB of storage for the same $1,599 starting price as the last-gen model. It also picks up a third Thunderbolt 4 port, which is positioned on the right side and supports dual external monitors while the lid is open. Also new in this model is an upgraded 12-megapixel webcam that supports Center Stage and a new Desk View feature, plus the option to add a nano-texture display for an extra $150. It’s also available in space black.

The 14- and 16-inch MacBook Pro models with M4 Pro and M4 Max chips also received additional RAM, bringing them up to 24GB. They start with 512GB of storage, too, and retail for $1,999 and $2,499, respectively. While the total port selection hasn’t changed compared to their respective M3 Pro and M3 Max counterparts, you’ll get faster Thunderbolt 5 ports on these more substantial models. That’s in addition to the SD slot, dedicated full-sized HDMI port, and 3.5mm jack. They also have the upgraded 12-megapixel Center Stage webcam with Desk View, as well as the optional nano-texture display option.

Many variations of the M4 MacBook Pro with different screen and processor configurations are on sale right now. For example, the 14-inch M4 Pro with a 10-core CPU, 10-core GPU, 16GB of RAM, and 512GB of storage is available for $1,299 ($300 off) at B&H Photo. You can also pick up the 14-inch Pro with 24GB of RAM, 512GB of storage, and an M4 Pro chip (12-core CPU / 16-core GPU) at Amazon and Best Buy for $1,749 ($250 off), which is a solid discount even if it’s not the biggest price drop we’ve seen in recent months.

Advertisement

The base 16-inch MacBook Pro, meanwhile, is on sale at Amazon and Best Buy with an M4 Pro chip, 24GB of RAM, and 512GB of storage for around $2,249 ($250 off), which is $120 more than the all-time low we saw during Black Friday.

Someone using MacBook Pro with M4 ProSomeone using MacBook Pro with M4 Pro

Apple’s latest revision of the 14.2-inch MacBook Pro adds the M5 processor. The generational leap will be felt most by those who have an older MacBook Pro, not those upgrading from the M4, unless you use specific AI apps that tap into the chip’s new Neural Accelerators. As for other design changes and upgrades to the inside and outside of this MacBook Pro, there really aren’t any major ones to note; in fact, it’s so similar to the M4 model that our reviewer Antonio Di Benedetto had to write “M5” on a sticky note just to be able to tell them apart. That being said, it’s still an amazing laptop, one that’s just now starting to get minor discounts.

The 14.2-inch base model with the M5 processor, 16GB of RAM, and 512GB of storage is down to $1,449 ($150 off) at Amazon, Best Buy, and B&H Photo, which is $100 shy of its best price to date.

The newest Mac Minis in town are the M4-based models, which arrived in late 2024. Apple reduced the horizontal footprint of its desktop and paired it with its M4 chipset and 16GB of RAM, which is double that of the previous generation and brings it in line with other base model Macs from 2024. That makes Apple’s newest desktop computer a tremendous value.

Deals on the newest Mac Mini are a bit easier to come by now than they were at launch, which is good since the outgoing M2 model is becoming more difficult to find. The M4 Mac Mini starts with an M4 processor, 16GB of RAM, and 256GB of storage for $599. That’s an incredible value for a tiny desktop computer that can rival the Mac Studio and Mac Pro when it comes to certain tasks, including light gaming, 4K video editing, and 3D modeling. Vertically, the M4 Mac Mini is a fair bit thicker than the last-gen M2 model at 2 inches tall, yet it measures a mere 5 inches wide and 5 inches deep.

In addition to the odd decision to place the power button on its underside, Apple moved the 3.5mm headphone jack and two of its five USB-C / Thunderbolt 4 ports to the front. The rear features an additional three Thunderbolt ports, HDMI-out, and a gigabit ethernet port. You can also get the Mac Mini with an M4 Pro chipset starting at $1,399, which comes with faster Thunderbolt 5 storage and the option to upgrade to 10-gigabit ethernet for another $100.

In the past, we’ve seen the base Mac Mini drop to as low as $469, but right now it’s only on sale at Amazon and B&H Photo with an M4 chip, 16GB of RAM, and a 256GB SSD for $499 ($100 off). If you need more storage, you can step up to the version with 16GB of RAM and a 512GB SSD for $689 ($110 off) at Amazon and B&H Photo. Meanwhile, the base M4 Pro model with 24GB of RAM and 512GB of storage is on sale for $1,269 ($130 off) at Amazon and B&H Photo.

Advertisement

Update, January 16th: Updated to reflect current pricing and availability.

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.


Continue Reading

Technology

ChatGPT Health promises privacy for health conversations

Published

on

ChatGPT Health promises privacy for health conversations

NEWYou can now listen to Fox News articles!

OpenAI is rolling out ChatGPT Health, a new space for private health and wellness conversations. Importantly, the company says it will not use your health information or Health chats to train its core artificial intelligence (AI) models. As more people turn to ChatGPT to understand lab results and prepare for doctor visits, that promise matters. For many users, privacy remains the deciding factor.

Meanwhile, Health appears as a separate space inside ChatGPT for early-access users. You will see it in the sidebar on desktop and in the menu on mobile. If you ask a health-related question in a regular chat, ChatGPT may suggest moving the conversation into Health for added protection. For now, access remains limited. However, OpenAI says it plans to roll out ChatGPT Health gradually to users on Free, Go, Plus and Pro plans.

Sign up for my FREE CyberGuy Report

Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Advertisement

AI DISCLOSURE IN HEALTHCARE: WHAT PATIENTS MUST KNOW

Health chats stay isolated from regular conversations and are excluded from AI training by default. (OpenAI)

What makes ChatGPT Health different from regular chats

ChatGPT Health is built as a separate environment, not just another chat thread. Here is what stands out:

A dedicated private space

Health conversations live in their own area. Files, chats and memories stay contained there. They do not mix with your regular ChatGPT conversations.

Clear medical boundaries

ChatGPT Health is not meant to diagnose conditions or replace a doctor. You will see reminders that responses are informational only and not medical advice.

Advertisement

Connecting your health data

If you choose, you can connect medical records and wellness apps to Health. This helps ground responses in your own data. Supported connections include:

  • Medical records, such as lab results and visit summaries
  • Apple Health for sleep, activity, and movement data
  • MyFitnessPal for nutrition and macros
  • Function for lab insights and nutrition guidance
  • Weight Watchers for GLP-1 meal ideas
  • Fitness and lifestyle apps like Peloton, AllTrails and Instacart

You control access. You can disconnect any app at any time and revoke permissions immediately.

Extra privacy protections

OpenAI says Health uses additional encryption and isolation designed specifically for sensitive health data. Health chats are excluded from training foundation models by default.

CAN AI CHATBOTS TRIGGER PSYCHOSIS IN VULNERABLE PEOPLE?

ChatGPT Health creates a separate space designed specifically for health and wellness conversations. (OpenAI)

Things you should not share on ChatGPT

Even with stronger privacy promises, caution still matters. Avoid sharing:

Advertisement
  • Full Social Security numbers
  • Insurance member IDs or policy numbers
  • Login credentials or passwords
  • Scans of government-issued IDs
  • Financial account numbers
  • Highly sensitive details you would not tell a clinician

Health is designed to inform and prepare you, not to replace professional care or secure systems built for identity protection.

ChatGPT Health was built with doctors

OpenAI built ChatGPT Health with direct input from more than 260 physicians across many medical specialties worldwide. Over two years, those clinicians reviewed hundreds of thousands of example responses and flagged wording that could confuse readers or delay care.

As a result, their feedback guides how ChatGPT Health explains lab results, frames risk, and prompts follow-ups with a licensed clinician. More importantly, the system focuses on safety, clarity, and timely escalation when needed. Ultimately, the goal is to help you have better conversations with your doctor, not replace one.

OPENAI LIMITS CHATGPT’S ROLE IN MENTAL HEALTH HELP

Users can connect medical records and wellness apps to better understand trends before talking with a doctor. (OpenAI)

What this means for you

For many people, health information is scattered across portals, PDFs, apps and emails. ChatGPT Health aims to pull that context together in one place.

Advertisement

That can help you:

The key takeaway is control. You decide what to connect, what to delete and when to walk away.

How to get access to ChatGPT Health

If you do not see Health yet, you can join the waitlist inside ChatGPT. Once you have access:

  • Select Health from the sidebar
  • Upload files or connect apps from Settings
  • Start asking questions grounded in your own data

You can also customize instructions inside Health to control tone, topics, and focus.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com        

Advertisement

Kurt’s key takeaways

ChatGPT Health reflects how people already use AI to understand their health. What matters most is the privacy line OpenAI is drawing. Health conversations stay separate and are not used to train core models. That promise builds trust, but smart sharing still matters. AI can help you prepare, understand and organize. Your doctor still makes the call.

Would you trust an AI assistant with your health data if it promised stronger privacy than standard chat tools, or does that still feel like a step too far?  Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report

Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com.  All rights reserved.

Advertisement

Continue Reading

Technology

Google brings its AI videomaker to Workspace users

Published

on

Google brings its AI videomaker to Workspace users

Google is expanding access to its AI videomaking tool. Launched last May, Flow was initially only available to Google AI Pro and AI Ultra subscribers, but now, those with Business, Enterprise, and Education Workspace plans can access it, too.

Flow uses Google’s AI video generation model Veo 3.1 to generate eight-second clips based on a text prompt or images. You can stitch together the clips to create longer scenes, as well as access a bunch of other tools that allow you to change the lighting, adjust the “camera” angle, and insert or remove objects in scenes. Earlier this week, Google added vertical video support inside Flow.

Google brought audio support to more features within Flow late last year, allowing you to generate audio whether you prompt the app based on reference images, ask it to create transitions between scenes, or have the tool extend a clip. The company also integrated its AI-powered image generator Nano Banana Pro into Flow, which you can use to create characters or starting points for your clips.

Continue Reading
Advertisement

Trending