扫码下载
BTC $77,559.91 -0.37%
ETH $2,316.48 +0.14%
BNB $637.24 +0.25%
XRP $1.43 +0.29%
SOL $86.35 +1.05%
TRX $0.3231 -1.60%
DOGE $0.0984 +1.22%
ADA $0.2511 +0.80%
BCH $455.22 -0.75%
LINK $9.41 +1.23%
HYPE $41.15 +0.09%
AAVE $94.93 +1.11%
SUI $0.9508 +0.63%
XLM $0.1729 -1.05%
ZEC $358.72 +4.63%
BTC $77,559.91 -0.37%
ETH $2,316.48 +0.14%
BNB $637.24 +0.25%
XRP $1.43 +0.29%
SOL $86.35 +1.05%
TRX $0.3231 -1.60%
DOGE $0.0984 +1.22%
ADA $0.2511 +0.80%
BCH $455.22 -0.75%
LINK $9.41 +1.23%
HYPE $41.15 +0.09%
AAVE $94.93 +1.11%
SUI $0.9508 +0.63%
XLM $0.1729 -1.05%
ZEC $358.72 +4.63%

慢雾余弦:求职者审代码中招“后门窃密”,私钥被直接扫走

2025-12-04 10:11:50
收藏

ChainCatcher 消息,慢雾余弦 @evilcos 提醒称,有 Web3 求职者在面试过程中遭遇恶意代码陷阱。事件中,攻击者冒充 @seracleofficial,要求求职者审阅并运行 Bitbucket 上的代码。受害者克隆代码后,程序立即扫描本地全部 .env 文件并窃取私钥等敏感信息。

慢雾方面指出,此类后门属于典型 stealer,可收集浏览器保存的密码、加密钱包助记词与私钥等隐私数据。专家强调,凡涉及可疑代码审查,务必在隔离环境中操作,避免在真实设备上直接运行以致遭受攻击。

app_icon
ChainCatcher 与创新者共建Web3世界