掃碼下載
BTC $77,535.34 -0.38%
ETH $2,316.46 +0.24%
BNB $637.13 +0.48%
XRP $1.43 +0.14%
SOL $86.37 +1.01%
TRX $0.3237 -1.20%
DOGE $0.0983 +0.74%
ADA $0.2518 +1.19%
BCH $455.37 -0.22%
LINK $9.43 +1.59%
HYPE $41.23 +0.36%
AAVE $94.82 +1.48%
SUI $0.9520 +0.86%
XLM $0.1734 -0.73%
ZEC $356.22 +3.46%
BTC $77,535.34 -0.38%
ETH $2,316.46 +0.24%
BNB $637.13 +0.48%
XRP $1.43 +0.14%
SOL $86.37 +1.01%
TRX $0.3237 -1.20%
DOGE $0.0983 +0.74%
ADA $0.2518 +1.19%
BCH $455.37 -0.22%
LINK $9.43 +1.59%
HYPE $41.23 +0.36%
AAVE $94.82 +1.48%
SUI $0.9520 +0.86%
XLM $0.1734 -0.73%
ZEC $356.22 +3.46%

慢霧餘弦:求職者審碼中招“後門竊密”,私鑰被直接掃走

2025-12-04 10:11:50
收藏

ChainCatcher 消息,慢霧餘弦 @evilcos 提醒稱,有 Web3 求職者在面試過程中遭遇惡意代碼陷阱。事件中,攻擊者冒充 @seracleofficial,要求求職者審閱並運行 Bitbucket 上的代碼。受害者克隆代碼後,程序立即掃描本地全部 .env 文件並竊取私鑰等敏感信息。

慢霧方面指出,此類後門屬於典型 stealer,可收集瀏覽器保存的密碼、加密錢包助記詞與私鑰等隱私數據。專家強調,凡涉及可疑代碼審查,務必在隔離環境中操作,避免在真實設備上直接運行以致遭受攻擊。

app_icon
ChainCatcher 與創新者共建Web3世界