DEV Community

Cover image for 🚨 The Rise of Criminal Bounties on Emerging Hiring Platforms (And How Developers Are Being Targeted)
Alejandro Steiner
Alejandro Steiner

Posted on

🚨 The Rise of Criminal Bounties on Emerging Hiring Platforms (And How Developers Are Being Targeted)

Recently, I had an experience that forced me to look deeper into a growing pattern affecting developers.

A relatively new hiring platform — rentahuman.ai — appears to be increasingly populated with suspicious job postings that, upon closer inspection, resemble operational funnels for organized cybercrime.

This is not speculation. I was personally approached for what looked like a legitimate Web3 full-stack engineering role.

The objective?

Deploy a repository locally.

At first glance, it looked like a normal technical assessment. But after analyzing the repository structure and behavior, it became clear that the code attempted to:

Extract local environment data

Access private keys and wallet configurations

Export sensitive files

Establish persistence mechanisms (backdoor behavior)

In other words: it wasn’t a job. It was an infiltration attempt.

⚠️ A Pattern Emerging

Browsing through the platform reveals several concerning categories of postings:

Requests to create fresh Gmail accounts

Requests to create LinkedIn profiles under real identities

Requests for “male representatives” to manage outreach profiles

Low-pay tasks to create verified accounts in Western jurisdictions

These are not random gigs.

This matches a documented pattern used by organized threat groups who:

Use Western individuals to create legitimate online identities.

Use those identities to apply for jobs in tech companies.

Infiltrate companies under false profiles.

Move laterally inside organizations.

Exfiltrate data, crypto assets, or intellectual property.

Developers participating in such activities — even unknowingly — may be enabling large-scale cyber operations.

đź§  Why This Is Dangerous

Many developers think:

“It’s just a $15 task.”
“It’s just setting up an email.”
“It’s just deploying a repo.”

But here’s the reality:

You may be hosting malicious infrastructure.

You may be laundering digital identities.

You may be enabling state-level infiltration tactics.

You may be violating federal laws without realizing it.

And if something goes wrong?

The blockchain, IP logs, and commit history won’t point to the organization behind it.

They will point to you.

🧬 The Full-Stack Engineer Trap

The most sophisticated version of this attack targets Web3 engineers.

The pattern is simple:

Offer high-paying remote Web3 role.

Provide a GitHub repository to deploy locally.

Repository includes obfuscated scripts.

Scripts attempt data extraction or wallet compromise.

Persistence mechanisms get installed silently.

This is supply-chain social engineering disguised as hiring.

🌍 The Identity Factory Problem

Another visible pattern on the platform includes requests like:

“Create fresh Gmail accounts”

“Sign up on Google Voice (US citizens only)”

“LinkedIn profile setup under real identity”

These are not normal freelance tasks.

They are identity amplification operations.

When Western citizens create legitimate-looking digital identities for unknown entities, those identities can later be used to:

Apply for corporate jobs

Access internal systems

Conduct fraud

Run phishing campaigns

Bypass geopolitical sanctions

And the individual who created the account becomes part of the chain.

🛡️ What Developers Should Do

If you encounter suspicious job postings:

Never run unknown repositories locally.

Always audit scripts before execution.

Use isolated virtual machines for analysis.

Avoid tasks that involve identity creation for third parties.

Refuse to create accounts under your legal identity for someone else.

Report suspicious listings.

If a task feels vague, rushed, or overly simplistic for the pay offered, it likely is.

⚖️ Legal and Ethical Reality

Even if you are “just doing a gig,” the legal system does not care about intent when infrastructure and identity abuse are involved.

You can become:

A participant in cybercrime.

An accessory to fraud.

A compliance violation in cross-border sanctions.

A risk vector for your current employer.

The $15 bounty is not worth the potential consequences.

Final Thought

Hiring platforms are powerful tools.

But when moderation is weak, they can become operational marketplaces for organized crime.

Developers need to raise awareness.

Security isn’t just about writing secure code.

It’s about refusing to be used as infrastructure.

Stay skeptical.
Stay isolated.
Audit everything.
Protect your identity.

Top comments (3)

Collapse
 
shitij_bhatnagar_b6d1be72 profile image
Shitij Bhatnagar

Thanks for the post.

If this is happening in reality, this is a new form of exploitation and quite a warning. Some very simple tasks can feel very attractive like this, doing 3-4 such tasks per day = 50-60 USD - so it's quite easy to fall for it for entry level developers or for people in need.

But to me this also feels like - these small kind of tasks even AI or AI agent can do, but of course you cannot remotely inject an AI agent into some user's machine to do this.

Collapse
 
alejandro_steiner profile image
Alejandro Steiner

What they're most interested in is identity theft. A company wouldn't hire someone from North Korea, for example. But they would hire a Western (USA) profile with an identity thief behind it.



Collapse
 
shitij_bhatnagar_b6d1be72 profile image
Shitij Bhatnagar

yes, clearly says 'Need a human'