Someone is trying to recruit security researchers in bizarre hacking campaign

A peculiar and potentially illegal job offer has surfaced, targeting cybersecurity professionals with the promise of up to $100,000 a month to hack Chinese websites. The recruiter, using alias 'Jack,' is reaching out through fake accounts on X and inviting experts to join a Telegram channel. Jack's goal involves obtaining web shells from Chinese domains, citing an interest in 'China’s traffic.' Professionals who received the offer describe it as bizarre and unconvincing, suggesting it might be a trolling attempt rather than a genuine recruitment effort.
The job offer's authenticity and intent remain uncertain, raising questions about potential motives, including malware distribution. Despite the high payment promised, industry experts find the campaign puzzling and unprecedented. The ambiguity surrounding the recruiter’s identity, with conflicting claims of government affiliation, adds to the mystery. The situation highlights the ongoing challenges in cybersecurity, where unconventional and suspicious requests can blur the lines between legitimate opportunities and dubious undertakings.
RATING
The article provides an intriguing look into an unusual recruitment campaign targeting cybersecurity professionals for hacking activities. Its strengths lie in the clarity and engagement of the narrative, supported by expert opinions and direct quotes. However, the story's accuracy is somewhat undermined by the lack of independent verification and reliance on unverified sources. The balance could be improved by including perspectives from potential targets or authorities. While the topic is timely and of public interest, its impact is limited to raising awareness and sparking discussions within the cybersecurity community. Overall, the article successfully captures the reader's attention but would benefit from more comprehensive verification and balanced representation.
RATING DETAILS
The story presents a factual account of a bizarre recruitment campaign targeting cybersecurity professionals for hacking Chinese websites. The claim that individuals are being offered up to $100,000 a month is specific and verifiable through the message content shared in the article. However, the story lacks independent verification of the recruiter's identity, purpose, and whether any payments have been made, which are critical to establishing the truthfulness of the claims. The narrative is supported by quotes from cybersecurity experts, but without concrete evidence or additional sources confirming the recruiter's legitimacy, the accuracy remains partially uncertain.
The article primarily presents the perspective of cybersecurity professionals and experts who are skeptical of the recruitment campaign. While it includes opinions from multiple experts, the story does not explore potential motivations or perspectives from the recruiter's side beyond the limited information provided by 'Jack.' This results in a somewhat one-sided view that could benefit from more balanced representation, perhaps by seeking input from authorities or organizations potentially affected by such hacking activities.
The article is well-structured and clearly presents the sequence of events and interactions with 'Jack.' The language is straightforward, and the tone is neutral, which aids in comprehension. The use of direct quotes and expert opinions helps clarify the bizarre nature of the job offer. However, some sections could benefit from additional context, particularly regarding the technical aspects of web shells and content management systems, to enhance reader understanding.
The sources cited in the article include cybersecurity experts and researchers, which lends some credibility to the story. However, the primary source of information, 'Jack,' is an unverified individual using AI-generated avatars and possibly fake accounts, which undermines the reliability of the information provided. The lack of corroboration from more authoritative or official sources, such as law enforcement or cybersecurity agencies, affects the overall source quality.
The article is relatively transparent about the methodology used to gather information, including direct communication with 'Jack' and conversations with cybersecurity experts. The author discloses their interactions and the context of the messages received. However, the story could improve transparency by clarifying any potential biases or limitations in the reporting process, such as the inability to verify 'Jack's' claims independently.
Sources
- https://techcrunch.com/2024/12/11/russian-government-spies-targeted-ukraine-using-tools-developed-by-cybercriminals/
- https://20fix.com
- https://techcrunch.com/2025/03/26/google-fixes-chrome-zero-day-security-flaw-used-in-hacking-campaign-targeting-journalists/
- https://techcrunch.com/2022/12/14/nsa-says-chinese-hackers-are-exploiting-a-zero-day-bug-in-popular-networking-gear/
- https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents
YOU MAY BE INTERESTED IN

Pete Hegseth reportedly had unsecured office internet line to connect to Signal
Score 6.6
Hackers using malware to steal data from USB flash drives
Score 7.2
AI Is Ushering In A New Era Of Cybersecurity Innovation—Here’s How
Score 6.0
Russian Broker Offers $4 Million For Telegram Zero-Day App Attack
Score 6.4