NEWYou tin present perceive to Fox News articles!
At archetypal glance, the occupation posts look wholly harmless. They committedness accelerated money, flexible hours and paid training. No acquisition required. Payment comes successful crypto. But these are not tutoring gigs oregon lawsuit work roles. They are recruiting ads for ransomware operations.
And galore of the radical responding are mediate and precocious schoolhouse students. Some posts openly accidental they similar inexperienced workers. Others softly prioritize young women. All of them committedness large payouts for "successful calls."
What they permission retired is the risk. Federal charges. Prison time. Permanent records. This underground ecosystem goes by a acquainted name. Insiders often notation to it arsenic "The Com," abbreviated for "The Community."
Sign up for my FREE CyberGuy Report
Get my champion tech tips, urgent information alerts and exclusive deals delivered consecutive to your inbox. Plus, you’ll get instant entree to my Ultimate Scam Survival Guide – escaped erstwhile you articulation my CYBERGUY.COM newsletter.
HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS

Fake occupation ads promising accelerated currency and flexible hours are softly recruiting teens into ransomware and extortion schemes, often paying successful cryptocurrency to fell transgression activity. (Donato Fasano/Getty Images)
How The Com operates down the scenes
The Com is not a azygous organized gang. It functions arsenic a escaped web of groups that regularly alteration names and members. Well-known offshoots tied to this ecosystem see Scattered Spider, Lapsus$, ShinyHunters and related splinter crews. Some groups absorption connected information theft. Others specialize in phishing or extortion. Collaboration happens erstwhile it benefits the operation.
Since 2022, these networks person targeted much than 100 large companies successful the U.S. and UK. Victims see well-known brands crossed retail, telecom, finance, manner and media, including companies specified arsenic T-Mobile, Nike and Instacart. The combined marketplace worth of affected companies exceeds 1 trillion dollars.
Teenagers often instrumentality connected the riskiest roles wrong these schemes. Phone calls, entree investigating and societal engineering scripts typically autumn to younger participants. More experienced criminals stay successful the background, limiting their exposure.
That operation mirrors what individuality and fraud experts are seeing crossed the industry. Ricardo Amper, laminitis and CEO of Incode Technologies, a integer individuality verification company, says fake occupation ads are effectual due to the fact that they get spot from a acquainted societal contract.
"A occupation station feels structured, mean and safe, adjacent erstwhile the existent behaviour being requested is thing but," Amper said. "A occupation posting implies a existent process - a role, a manager, grooming and a paycheck. That's precisely wherefore it works. It lowers skepticism and makes risky requests consciousness similar mean onboarding."
Amper notes that what's changed is not conscionable the standard of recruitment, but however criminals bundle it. "Serious transgression is present being sold arsenic 'work.'"
Why teens excel astatine societal engineering attacks
Teenagers bring a unsocial premix of skills that marque them highly convincing. Fluent English and comfortableness with modern workplace exertion assistance them dependable legitimate. Familiarity with tools similar Slack, ticketing systems and unreality platforms makes impersonation easier.
According to Amper, teens don't request method expertise to get pulled in. "The on-ramp is usually social, a Discord server, a DM, a 'quick gig,'" helium said. "It tin consciousness similar trolling culture, but the targets are existent companies and the consequences are existent people."
Risk consciousness is often lower. Conversations often instrumentality spot successful nationalist chats, wherever tactics and mistakes are shared quickly. That visibility accelerates learning and increases the likelihood of detection and arrest.
Gaming civilization feeds the pipeline
For galore teens, it starts small. Pranks successful online games crook into relationship takeovers. Username theft becomes crypto theft. Skills escalate. So bash the stakes.
Recruitment often begins successful gaming spaces wherever accelerated learning and assurance are rewarded. Grooming is common. Sextortion sometimes appears. By the clip existent wealth enters the picture, ineligible consequences consciousness distant.
Amper compares the progression to gaming itself. "These crews bundle transgression arsenic a ladder," helium said. "Join the group, bash tiny tasks, level up, get paid, get status."
Why young women are being targeted
Cybercrime remains male-dominated, but recruiters adapt. Young women are progressively recruited for phone-based attacks. Some usage AI tools to change accents oregon tone. Others trust connected stereotypes. Distress lowers suspicion faster than authority. Researchers accidental women often win due to the fact that they are underestimated. That aforesaid dynamic puts them astatine hazard wrong these groups. Leadership remains overwhelmingly male. Girls often execute low-level work. Training stays minimal. Exploitation is frequent.
Red flags that awesome fake occupation scams and ransomware recruitment
These informing signs amusement up repeatedly successful cases involving teen hackers, societal engineering crews and ransomware groups.
Crypto-only wage is simply a large informing sign
Legitimate employers bash not wage workers exclusively successful cryptocurrency. Crypto-only wage makes transactions hard to hint and protects criminals, not workers.
Per-call oregon per-task payouts should rise concern
Promises of hundreds of dollars for a azygous telephone oregon speedy task often constituent to amerciable activity. Real jobs wage hourly oregon a wage with documentation.
Recruitment done Telegram oregon Discord is simply a reddish flag
Criminal groups trust connected backstage messaging apps to debar oversight. Established companies bash not enlistee employees done gaming chats oregon encrypted DMs.
Anonymous mentors and vague grooming are dangerous
Being "trained from scratch" by unnamed individuals is communal successful ransomware pipelines. These mentors vanish erstwhile arrests happen.
Secrecy requests awesome manipulation
Any occupation that asks teens to fell enactment from parents oregon employees to fell tasks from employers is crossing a line. Secrecy protects the recruiter, not the recruit.
Amper offers a elemental regularisation of thumb: "If a 'job' asks you to unreal to beryllium idiosyncratic else, get access, determination money, oregon stock delicate identifiers earlier you've verified the employer, you're not successful a hiring process. You're successful a transgression pipeline."
He adds that morganatic employers cod delicate accusation lone aft a existent offer, done verified HR systems. "The scam mentation flips the order," helium said. "It asks for the astir delicate details first, earlier thing is independently verifiable."
Urgency and affectional unit are deliberate tactics
Rushing decisions oregon creating fearfulness lowers judgment. Social engineering depends connected velocity and affectional reactions.
If you spot much than 1 of these signs, intermission immediately. Walking distant aboriginal tin forestall superior ineligible consequences later.
MICROSOFT TYPOSQUATTING SCAM SWAPS LETTERS TO STEAL LOGINS

Cybercrime recruiters are targeting mediate and precocious schoolhouse students for risky roles similar societal engineering calls, exposing them to national charges and situation time. (Philip Dulian/picture confederation via Getty Images)
Law enforcement is cracking down connected teen cybercrime
Since 2024, authorities indictments and planetary arrests person shown cybercriminal groups tied to The Com and Scattered Spider are nether expanding scrutiny from instrumentality enforcement. In Sept. 2025, U.S. prosecutors unsealed a Department of Justice complaint against 19-year-old Thalha Jubair, accusing him of orchestrating astatine slightest 120 ransomware and extortion attacks that brought successful implicit $115 cardinal successful ransom payments from 47 U.S. companies and organizations, including national tribunal networks. Prosecutors charged Jubair with machine fraud, ligament fraud and wealth laundering conspiracy.
Across the Atlantic, British authorities charged Jubair and 18-year-old Owen Flowers for their alleged roles successful a Transport for London cyberattack successful 2024 that compromised question paper information and disrupted unrecorded commuter information. Both appeared successful tribunal nether the U.K.'s Computer Misuse Act. Earlier instrumentality enforcement enactment successful the U.S. included transgression charges against 5 Scattered Spider suspects for wide phishing campaigns that stole login credentials and millions successful cryptocurrency, laying retired however members of this corporate staged coordinated extortion and information theft.
Federal agencies are besides issuing advisories astir the group's societal engineering techniques, noting however attackers impersonate assistance desks, maltreatment multi-factor authentication and harvest credentials to entree firm networks.
Parents often larn the information late. In galore cases, the archetypal informing comes erstwhile national agents get astatine the door. Teens tin determination from online pranks to superior national crimes without realizing wherever the ineligible enactment lies.
How parents and teens tin debar ransomware recruitment traps
This benignant of cybercrime thrives connected soundlessness and speed. Slowing things down protects families and futures.
Tips for parents and guardians to spot fake occupation scams early
Parents play a captious relation successful spotting aboriginal informing signs, particularly erstwhile online "work" starts happening down closed doors oregon moves excessively accelerated to explain.
1) Pay attraction to however online "jobs" are communicated
Ask which platforms your kid uses for enactment conversations and who they speech to. Legitimate employers bash not enlistee done Telegram oregon Discord DMs.
2) Question abrupt income with nary wide employer
Money appearing quickly, particularly successful crypto, deserves scrutiny. Real jobs supply paperwork, supervisors and wage records.
3) Treat secrecy arsenic a superior informing sign
If a teen is told to support enactment backstage from parents oregon teachers, that is not independence. It is manipulation.
4) Talk aboriginal astir ineligible consequences online
Many teens bash not recognize that cybercrime tin pb to national charges. Honest conversations present forestall life-changing outcomes later. Also, monitoring whitethorn consciousness uncomfortable. However, soundlessness creates much risk.
Tips for teens to debar fake occupation offers and cybercrime traps
Teenagers with tech skills person existent opportunities ahead, but knowing however to spot fake offers tin mean the quality betwixt gathering a vocation and facing superior ineligible trouble.
1) Be skeptical of backstage messages offering accelerated money
Real companies bash not cold-recruit done backstage chats oregon gaming servers.
2) Avoid crypto-only outgo offers
Being paid lone successful cryptocurrency is simply a communal maneuver utilized to fell transgression activity.
3) Choose ineligible paths to physique skills and reputation
Bug bounty programs, cybersecurity clubs and internships connection existent acquisition without risking your future. Talent opens doors. Prison closes them.
Take my quiz: How harmless is your online security?
Think your devices and information are genuinely protected? Take this speedy quiz to spot wherever your integer habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing close and what needs improvement. Take my Quiz here: Cyberguy.com
FBI WARNS OF FAKE KIDNAPPING PHOTOS USED IN NEW SCAM

A escaped cybercrime web known arsenic "The Com" has been linked to large U.S. and U.K. information breaches affecting companies worthy trillions combined. (Photo by Uli Deck/picture confederation via Getty Images)
Kurt's cardinal takeaways
What makes this inclination truthful unsettling is however mean it each looks. The occupation ads dependable harmless. The chats consciousness friendly. The crypto payouts look exciting. But underneath that aboveground is simply a pipeline pulling teenagers into superior crimes with existent consequences. Many kids bash not recognize however acold they person gone until it is excessively late. What starts arsenic a speedy telephone oregon a broadside hustle tin crook into national charges and years of fallout. Cybercrime moves fast. Accountability usually shows up overmuch later. By the clip it does, the harm is already done.
If fake occupation ads tin softly enlistee teenagers into ransomware gangs, however assured are you that your household oregon workplace would spot the informing signs earlier it is excessively late? Let america cognize by penning to america at Cyberguy.com.
CLICK HERE TO GET THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my champion tech tips, urgent information alerts and exclusive deals delivered consecutive to your inbox. Plus, you’ll get instant entree to my Ultimate Scam Survival Guide – escaped erstwhile you articulation my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Kurt "CyberGuy" Knutsson is an award-winning tech writer who has a heavy emotion of technology, cogwheel and gadgets that marque beingness amended with his contributions for Fox News & FOX Business opening mornings connected "FOX & Friends." Got a tech question? Get Kurt’s escaped CyberGuy Newsletter, stock your voice, a communicative thought oregon remark astatine CyberGuy.com.










English (CA) ·
English (US) ·
Spanish (MX) ·