Connect with us

Technology

Teen hackers recruited through fake job ads

Published

on

Teen hackers recruited through fake job ads

NEWYou can now listen to Fox News articles!

At first glance, the job posts look completely harmless. They promise fast money, flexible hours and paid training. No experience required. Payment comes in crypto. But these are not tutoring gigs or customer service roles. They are recruiting ads for ransomware operations. 

And many of the people responding are middle and high school students. Some posts openly say they prefer inexperienced workers. Others quietly prioritize young women. All of them promise big payouts for “successful calls.”

What they leave out is the risk. Federal charges. Prison time. Permanent records. This underground ecosystem goes by a familiar name. Insiders often refer to it as “The Com,” short for “The Community.”

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS

Fake job ads promising fast cash and flexible hours are quietly recruiting teens into ransomware and extortion schemes, often paying in cryptocurrency to hide criminal activity. (Donato Fasano/Getty Images)

How The Com operates behind the scenes

The Com is not a single organized gang. It functions as a loose network of groups that regularly change names and members. Well-known offshoots tied to this ecosystem include Scattered Spider, Lapsus$, ShinyHunters and related splinter crews. Some groups focus on data theft. Others specialize in phishing or extortion. Collaboration happens when it benefits the operation. 

Since 2022, these networks have targeted more than 100 major companies in the U.S. and UK. Victims include well-known brands across retail, telecom, finance, fashion and media, including companies such as T-Mobile, Nike and Instacart. The combined market value of affected companies exceeds one trillion dollars.

Teenagers often take on the riskiest roles within these schemes. Phone calls, access testing and social engineering scripts typically fall to younger participants. More experienced criminals remain in the background, limiting their exposure.

Advertisement

That structure mirrors what identity and fraud experts are seeing across the industry. Ricardo Amper, founder and CEO of Incode Technologies, a digital identity verification company, says fake job ads are effective because they borrow trust from a familiar social contract. 

“A job post feels structured, normal and safe, even when the actual behavior being requested is anything but,” Amper said. “A job posting implies a real process – a role, a manager, training and a paycheck. That’s exactly why it works. It lowers skepticism and makes risky requests feel like normal onboarding.”

Amper notes that what’s changed is not just the scale of recruitment, but how criminals package it. “Serious crime is now being sold as ‘work.’”

Why teens excel at social engineering attacks

Teenagers bring a unique mix of skills that make them highly convincing. Fluent English and comfort with modern workplace technology help them sound legitimate. Familiarity with tools like Slack, ticketing systems and cloud platforms makes impersonation easier.

According to Amper, teens don’t need technical expertise to get pulled in. “The on-ramp is usually social, a Discord server, a DM, a ‘quick gig,’” he said. “It can feel like trolling culture, but the targets are real companies and the consequences are real people.”

Advertisement

Risk awareness is often lower. Conversations frequently take place in public chats, where tactics and mistakes are shared quickly. That visibility accelerates learning and increases the likelihood of detection and arrest.

Gaming culture feeds the pipeline

For many teens, it starts small. Pranks in online games turn into account takeovers. Username theft becomes crypto theft. Skills escalate. So do the stakes.

Recruitment often begins in gaming spaces where fast learning and confidence are rewarded. Grooming is common. Sextortion sometimes appears. By the time real money enters the picture, legal consequences feel distant.

Amper compares the progression to gaming itself. “These crews package crime as a ladder,” he said. “Join the group, do small tasks, level up, get paid, get status.”

Why young women are being targeted

Cybercrime remains male-dominated, but recruiters adapt. Young women are increasingly recruited for phone-based attacks. Some use AI tools to alter accents or tone. Others rely on stereotypes. Distress lowers suspicion faster than authority. Researchers say women often succeed because they are underestimated. That same dynamic puts them at risk inside these groups. Leadership remains overwhelmingly male. Girls often perform low-level work. Training stays minimal. Exploitation is frequent.

Advertisement

Red flags that signal fake job scams and ransomware recruitment

These warning signs show up repeatedly in cases involving teen hackers, social engineering crews and ransomware groups.

Crypto-only pay is a major warning sign

Legitimate employers do not pay workers exclusively in cryptocurrency. Crypto-only pay makes transactions hard to trace and protects criminals, not workers.

Per-call or per-task payouts should raise concern

Promises of hundreds of dollars for a single call or quick task often point to illegal activity. Real jobs pay hourly or a salary with documentation.

Recruitment through Telegram or Discord is a red flag

Criminal groups rely on private messaging apps to avoid oversight. Established companies do not recruit employees through gaming chats or encrypted DMs.

Anonymous mentors and vague training are dangerous

Being “trained from scratch” by unnamed individuals is common in ransomware pipelines. These mentors disappear when arrests happen.

Advertisement

Secrecy requests signal manipulation

Any job that asks teens to hide work from parents or employees to hide tasks from employers is crossing a line. Secrecy protects the recruiter, not the recruit.

Amper offers a simple rule of thumb: “If a ‘job’ asks you to pretend to be someone else, obtain access, move money, or share sensitive identifiers before you’ve verified the employer, you’re not in a hiring process. You’re in a crime pipeline.”

He adds that legitimate employers collect sensitive information only after a real offer, through verified HR systems. “The scam version flips the order,” he said. “It asks for the most sensitive details first, before anything is independently verifiable.”

Urgency and emotional pressure are deliberate tactics

Rushing decisions or creating fear lowers judgment. Social engineering depends on speed and emotional reactions.

If you see more than one of these signs, pause immediately. Walking away early can prevent serious legal consequences later.

Advertisement

MICROSOFT TYPOSQUATTING SCAM SWAPS LETTERS TO STEAL LOGINS

Cybercrime recruiters are targeting middle and high school students for risky roles like social engineering calls, exposing them to federal charges and prison time. (Philip Dulian/picture alliance via Getty Images)

Law enforcement is cracking down on teen cybercrime

Since 2024, government indictments and international arrests have shown cybercriminal groups tied to The Com and Scattered Spider are under increasing scrutiny from law enforcement. In Sept. 2025, U.S. prosecutors unsealed a Department of Justice complaint against 19-year-old Thalha Jubair, accusing him of orchestrating at least 120 ransomware and extortion attacks that brought in over $115 million in ransom payments from 47 U.S. companies and organizations, including federal court networks. Prosecutors charged Jubair with computer fraud, wire fraud and money laundering conspiracy.

Across the Atlantic, British authorities charged Jubair and 18-year-old Owen Flowers for their alleged roles in a Transport for London cyberattack in 2024 that compromised travel card data and disrupted live commuter information. Both appeared in court under the U.K.’s Computer Misuse Act. Earlier law enforcement action in the U.S. included criminal charges against five Scattered Spider suspects for mass phishing campaigns that stole login credentials and millions in cryptocurrency, laying out how members of this collective staged coordinated extortion and data theft.

Federal agencies are also issuing advisories about the group’s social engineering techniques, noting how attackers impersonate help desks, abuse multi-factor authentication and harvest credentials to access corporate networks.

Advertisement

Parents often learn the truth late. In many cases, the first warning comes when federal agents arrive at the door. Teens can move from online pranks to serious federal crimes without realizing where the legal line lies.

How parents and teens can avoid ransomware recruitment traps

This type of cybercrime thrives on silence and speed. Slowing things down protects families and futures.

Tips for parents and guardians to spot fake job scams early

Parents play a critical role in spotting early warning signs, especially when online “work” starts happening behind closed doors or moves too fast to explain.

1) Pay attention to how online “jobs” are communicated

Ask which platforms your child uses for work conversations and who they talk to. Legitimate employers do not recruit through Telegram or Discord DMs.

Advertisement

2) Question sudden income with no clear employer

Money appearing quickly, especially in crypto, deserves scrutiny. Real jobs provide paperwork, supervisors and pay records.

3) Treat secrecy as a serious warning sign

If a teen is told to keep work private from parents or teachers, that is not independence. It is manipulation.

4) Talk early about legal consequences online

Advertisement

Many teens do not realize that cybercrime can lead to federal charges. Honest conversations now prevent life-changing outcomes later. Also, monitoring may feel uncomfortable. However, silence creates more risk.

Tips for teens to avoid fake job offers and cybercrime traps

Teenagers with tech skills have real opportunities ahead, but knowing how to spot fake offers can mean the difference between building a career and facing serious legal trouble.

1) Be skeptical of private messages offering fast money

Real companies do not cold-recruit through private chats or gaming servers.

2) Avoid crypto-only payment offers

Advertisement

Being paid only in cryptocurrency is a common tactic used to hide criminal activity.

3) Choose legal paths to build skills and reputation

Bug bounty programs, cybersecurity clubs and internships offer real experience without risking your future. Talent opens doors. Prison closes them.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

Advertisement

FBI WARNS OF FAKE KIDNAPPING PHOTOS USED IN NEW SCAM

A loose cybercrime network known as “The Com” has been linked to major U.S. and U.K. data breaches affecting companies worth trillions combined. (Photo by Uli Deck/picture alliance via Getty Images)

Kurt’s key takeaways

What makes this trend so unsettling is how ordinary it all looks. The job ads sound harmless. The chats feel friendly. The crypto payouts seem exciting. But underneath that surface is a pipeline pulling teenagers into serious crimes with real consequences. Many kids do not realize how far they have gone until it is too late. What starts as a quick call or a side hustle can turn into federal charges and years of fallout. Cybercrime moves fast. Accountability usually shows up much later. By the time it does, the damage is already done.

If fake job ads can quietly recruit teenagers into ransomware gangs, how confident are you that your family or workplace would spot the warning signs before it is too late? Let us know by writing to us at Cyberguy.com.

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com.  All rights reserved.

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Sotomayor’s Wabi Sabi is the funnest record of 2026

Published

on

Sotomayor’s Wabi Sabi is the funnest record of 2026

Shout out to subscriber N_Gorski for today’s pick. They popped into the comments on last week’s recommendation to ask what I thought of the new Sotomayor record. Well, I hadn’t actually heard it yet, but now I’m obsessed.

The group consists of siblings Raul and Paulina Sotomayor from Mexico City. Wabi Sabi is their first record since 2020’s Origenes, and it is pure joy. You can look back through everything I’ve recommended over the last several months, and “fun” is not how you’d describe most of it. But that’s what Wabi Sabi is — it’s fun, chaotic, and dancey as hell.

I was only familiar with Sotomayor before this because of a short documentary about Raul’s various projects made by Ableton. In that video, he discusses how his approach to making music has changed over the years. How he used to try to make things sound “proper” and “clean,” but now it’s about “how much can we distort it” or “how much can we stretch it.”

You can certainly hear that in the music. The first track, “Me dejo llevar,” opens with a synth arpeggio that has clearly been timestretched to within an inch of its life. It’s loaded with digital artifacts. The whole track has a light crust, as if everything is clipping just ever so slightly. “Who’s there” similarly bristles as the edges, sounding like a dance floor constantly on the verge of erupting into a riot.

The vintage electronic drum hits, droning bass, and reverb-drenched noise stabs never reach full catharsis, but simmer beautifully into album highlight “Vida.” Here, Paulina finds a sultry gear as she croons over a UK garage-inflected track that eventually erupts into an afrohouse club banger.

Advertisement

Wabi Sabi ricochets between genres with infectious abandon. Afrobeat, cumbia, electro pop, R&B, and more all collide in what is easily the most fun album of 2026 so far. What makes it all the more impressive is that, for all its unconventional sounds (a donkey jaw?) and stylistic excursions, Sotomayor still has a distinct vision that holds the record together.

At no point does the chaos threaten to overwhelm. Never does it feel like the duo are simply throwing things at the wall to see what sticks; everything is a carefully made decision in service of the party. The gently meandering guitar of “Yo se todo de ti,” the classic house of “Todo se derrumba,” and the dancehall of “Prende la palma” all feel unified by Paulina’s undeniable charisma on the mic and Raul’s uninhibited sonic curiosity.

Continue Reading

Technology

Smart glasses detector app warns if you’re being recorded

Published

on

Smart glasses detector app warns if you’re being recorded

NEWYou can now listen to Fox News articles!

Smart glasses are built to blend in. Most of the time, they look just like a normal pair of glasses. The difference is that some models can quietly take photos or record video without anyone nearby realizing it.

As these wearable cameras start showing up in everyday places, more people are wondering when they might be on camera. That concern helped inspire a new Android app called Nearby Glasses, which lets you check whether smart glasses may be nearby.

The idea behind the app is simple. If a nearby device is broadcasting a Bluetooth signal linked to smart glasses, the app tries to detect it. For people worried about hidden cameras in public spaces, even a small warning could help them stay more aware of their surroundings.

META SMART GLASSES PRIVACY CONCERNS GROW

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Mark Zuckerberg sported a pair of Meta Ray-Ban Display AI glasses while speaking at the Meta Connect event in Menlo Park, California, on Sept. 17, 2025. (David Paul Morris/Bloomberg via Getty Images)

Why smart glasses are raising privacy concerns

Smart glasses are designed to blend in. Unlike a phone or camera, they often look identical to regular eyewear. That means someone could be filming without anyone around them realizing it.

Modern versions of these devices can capture photos, record video and even livestream. Some models also connect to AI tools that can analyze what the wearer sees. Privacy advocates say the biggest problem is visibility. When someone pulls out a phone to record, people usually notice.

With smart glasses, the camera may be hidden in plain sight. As a result, conversations about consent and privacy are becoming more urgent as wearable cameras spread.

Advertisement

How the nearby glasses app works

Nearby Glasses works by scanning for Bluetooth signals that devices broadcast to connect with phones and other hardware. Each manufacturer uses unique Bluetooth identifiers. The app listens for those signals and compares them to known identifiers from companies that produce wearable devices. If the app detects one of those signals, it alerts the user.

Here is how the process works:

  • The app scans nearby Bluetooth devices in real time
  • It checks each signal against known manufacturer identifiers
  • If a match appears, the user receives an alert

The app currently focuses on devices made by companies such as Meta and Snap. Users can also add additional Bluetooth identifiers to expand what the app detects. That allows the tool to flag more types of wearable tech. To keep scanning continuously, users must enable a foreground service in the app and press Start Scanning. A debug log then displays the scanning activity while the app runs.

Why the developer created the app

The app was developed by software creator Yves Jeanrenaud, who says he built it after seeing how wearable cameras were being used. On the project page, Jeanrenaud described smart glasses as a major privacy concern. He believes the devices could open the door to more recording without consent.

He also pointed to reports about smart glasses appearing in sensitive situations. Those examples include cases where wearable cameras were allegedly used during immigration enforcement or in situations where people were filmed without permission.

According to Jeanrenaud, the app represents what he calls a form of technological resistance. In other words, using technology to push back against technology. Still, even he admits it may only address part of the problem.

Advertisement

As smart glasses become more common in public places, tools like the Nearby Glasses app aim to help people stay aware of possible hidden recording devices. (Kurt “CyberGuy” Knutsson)

The app is helpful but not perfect

Like any detection tool, Nearby Glasses has limitations. Bluetooth signals do not always reveal exactly what device is nearby. For example, a device made by the same manufacturer could trigger an alert. That means a headset or other gadget might appear as a possible pair of smart glasses.

False positives are possible. However, those alerts still give users more awareness of nearby devices that could be capturing data. Right now, the app is available only for Android. The developer has said an iPhone version could happen in the future, depending on time and demand.

Ways to stay safe around smart glasses

Smart glasses are becoming more common. While tools like Nearby Glasses can help, awareness is still the best defense. Here are several ways to protect your privacy.

Pay attention to visible camera indicators

Some smart glasses include small LED lights that turn on while recording. If you notice a light on someone’s frames, they may be filming.

Advertisement

Speak up if you feel uncomfortable

If you suspect someone is recording you in a private setting, you can ask them directly. Many people stop when confronted.

Avoid sensitive conversations in crowded areas

Wearable cameras thrive in public environments where people are distracted. Avoid discussing personal information in places where recording could occur.

Disable Bluetooth visibility on your own devices

Limiting the signals your devices broadcast can reduce how easily others track or scan your hardware.

WORLD’S THINNEST AI GLASSES FEATURE BUILT-IN AI ASSISTANT

Stay informed about wearable tech

Smart glasses are evolving quickly. Learning how they work helps you recognize when someone might be using one nearby.

Advertisement

Mark Zuckerberg wears the Meta Ray-Ban Display glasses while speaking at the company’s headquarters in Menlo Park, California, on Sept. 17, 2025. (Reuters/Carlos Barria)

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

Smart glasses represent a strange moment in the evolution of technology. On one hand, they promise convenience. People can capture moments hands-free or access digital information instantly. On the other hand, they blur the line between everyday life and constant surveillance. Apps like Nearby Glasses show that some people are already pushing back. They want tools that reveal when hidden cameras might be nearby. However, technology alone will not settle the debate. The real question is how society decides to balance innovation with basic expectations of privacy.

And that leads to a bigger question. If cameras can hide in ordinary glasses, should people be required to reveal when they are recording you? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com.  All rights reserved.

Advertisement
Continue Reading

Technology

Trump administration is allegedly collecting $10 billion on the TikTok deal

Published

on

Trump administration is allegedly collecting  billion on the TikTok deal

In September, Donald Trump claimed that “the United States is getting a tremendous fee” for brokering the TikTok deal. Now sources tell the Wall Street Journal and the New York Times that fee is expected to be in the range of $10 billion. The money is supposedly being paid by new investors, including Oracle and Silver Lake. Reports are that $2.5 billion was already paid to the Treasury when the deal closed on January 22nd. The rest will be paid out in installments.

This is the latest example of the Trump administration inserting itself into private business in unprecedented ways, including taking on a 10-percent stake in Intel last August, a “golden share” in US Steel, and a 20-percent cut in chip sales from Nvidia to China. In this instance, the deal also involves one of Trump’s biggest supporters and fundraisers, Larry Ellison, co-founder and CTO of Oracle.

If the reporting is accurate, the fee would represent over 70 percent of the deal’s value, which saw a group of investors take a majority stake in TikTok for $14 billion.

Continue Reading

Trending