Feed aggregator

Show HN: DelinkedIn – A Chrome extension that roasts LinkedIn job listings

Hacker News - Wed, 03/26/2025 - 7:07am

I am fed up with LinkedIn job listings.

They’re all full of vague buzzwords — 'team player,' 'self-starter,' stuff like that - so many words, so little substance. I'm over wasting my time reading their HR word salad.

So I built DelinkedIn. It's a Chrome extension that roasts LinkedIn job listings. It uses Grok AI to turn HR fluff into harsh reality:

‘Fast-paced environment’ becomes ‘You’ll never catch your breath.’ ‘Wearing many hats’ turns into ‘One salary, five jobs.’ ‘Collaborative culture’ is now ‘Endless meetings, no decisions.’

It’s a quick hack - grabs the job description, sends it to Grok, and swaps in the rewrite. Took me a day to throw together. You can install the .crx from delinkedin.com while it’s pending Chrome Store review (fingers crossed it's approved soon).

There are 5 'cynicism levels' you can choose from in the extension settings. Obviously level 5 is the best. I may even turn it up another 3 notches.

Curious what people think — will this hit a nerve? I sure hope so.

Comments URL: https://news.ycombinator.com/item?id=43480867

Points: 1

# Comments: 0

Categories: Hacker News

Fake Booking.com phish uses fake CAPTCHAs to trick hotel staff into downloading malware

Malware Bytes Security - Wed, 03/26/2025 - 7:03am

A new phishing campaign that uses the fake CAPTCHA websites we reported about recently is targeting hotel staff in a likely attempt to access customer data, according to research from ThreatDown.

Here’s how it works: Cybercriminals send a fake Booking.com email to a hotel’s email address, asking them to confirm a booking.

“Dear Team,

You have received a new booking. Please find the details below:

Reservation number: 5124588434141

Guest Name: Margit Kainz

Check-in Date: 2025-03-25

Check-out Date: 2025-04-01

Room Type: Deluxe Double Room

Guests: 2 Adults

Special Requests:Early check-in requested (before 2 PM)

Payment Status: Payment at property

{link to landing page}

(Copy and paste this link in your browser to confirm booking)

Please ensure the room is prepared according to the guest’s requests.

If you have any questions or need more information, please contact the guest directly or through our platform.

Thank you for your cooperation,

The Booking.com Team”

The email is sent only a few days before the check-in-date, which is very likely to create a sense of urgency—a common tactic of scammers.

But if the hotel staff were to copy and paste the URL into the browser address bar they will be greeted by this fake CAPTCHA website.

When they check the box, they’ll then see “verification” instructions that will effectively infect their system.

“Verification steps

Press Windows Key + R.

Press Ctrl + V.

Press Enter”

As we explained in more detail here, these instructions will infect their Windows system with an information stealer or Trojan.

What the hotel staff would actually be doing is copy and pasting a mshta command into the Run prompt and then executing the command, which then fetches a remote file and then runs it on their system.

We don’t know the exact plans of the criminals once they have gained control over the system, but it’s highly likely they’re after customer payment details and other personal data: Data that is very valuable to them and can be traded on the dark web.

There isn’t much you can do to protect your own data in situations like these, when cybercriminals are attacking the companies that hold your personal information. However, there are a few things you can do to lower your risk.

How to protect your data online
  • Don’t store your card details. Not in your browser, not on websites. Sure, it’s more convenient to get sites to remember your card details for you, but we highly recommend not storing that information.
  • Find out what information is already out there. Our free Digital Footprint scan searches the dark web, social media, and other online sources, to tell you where your data has been exposed.
  • Remove as much of that information as you can. You can do this manually by cleaning things up yourself, or if you’re in the US then you can use Malwarebytes Personal Data Remover to do it for you.
  • Monitor your accounts. Check your accounts periodically for unexpected changes and notifications of suspicious login attempts.
  • Use a different password for every online account. Choose a strong password that you don’t use for anything else. Better yet, let a password manager choose one for you.
  • Enable two-factor authentication (2FA). If you can, use a FIDO2-compliant hardware key, laptop or phone as your second factor. Some forms of two-factor authentication (2FA) can be phished just as easily as a password. 2FA that relies on a FIDO2 device can’t be phished.
  • Set up identity monitoring. Identity monitoring alerts you if your personal information is found being traded illegally online, and helps you recover after.

Categories: Malware Bytes

DeepSeek users targeted with fake sponsored Google ads that deliver malware

Malware Bytes Security - Wed, 03/26/2025 - 7:01am

The threat intel research used in this post was provided by Malwarebytes Senior Director of Research, Jérôme Segura.

DeepSeek’s rising popularity has not only raised concerns and questions about privacy implications, but cybercriminals are also using it as a lure to trap unsuspecting Google searchers.

Unfortunately, we are getting so used to sponsored Google search results being abused by criminals that we advise people not to click on them. So, it was to be expected that DeepSeek would show up in our monitoring of fake Google ads.

Here’s the fake ad:

If you put it side by side with the real DeepSeek ads, the difference is relatively easy to spot:

But as an unsuspecting searcher, you aren’t likely to make that comparison, and as you may know from previous posts about fake Google sponsored ads, the criminals behind these campaigns can be a lot more convincing.

In this case, they certainly put a lot more effort into creating the fake website which the advertisement linked to:

It’s different from the real website, but it looks convincing, nonetheless.

Should you happen to click the download button, you will receive a Trojan programmed in Microsoft Intermediate Language (MSIL), which the Artificial Intelligence (AI) module in Malwarebytes/ThreatDown products detects as Malware.AI.1323738514.

How to avoid these traps

As we mentioned earlier, Google has demonstrated that it can’t keep fake ads out of its sponsored search results. And apparently the success rate of these fake ads is high enough to allow the criminals to pay Google enough to outrank legitimate brands.

So, our first tip is not to click on sponsored search results. Ever.

The second tip is to look at the advertiser by clicking the three dots behind the URL in the search result and look whether he advertiser listed is the legitimate owner of the brand or not.

Here is one example of another DeepSeek impersonator we found. The advertiser’s name is not in Chinese characters by the way. The language in which the advertiser’s name is written is Hebrew: תמיר כץ.

If you don’t want to see sponsored ads at all then it’s worth considering installing an ad-blocker that will make sure you go straight to the regular search results.

We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

Categories: Malware Bytes

Pages