扫码下载
BTC $71,739.46 +5.06%
ETH $2,223.91 +6.84%
BNB $605.70 +0.74%
XRP $1.36 +4.41%
SOL $83.60 +5.34%
TRX $0.3181 +1.23%
DOGE $0.0935 +3.29%
ADA $0.2551 +5.49%
BCH $443.81 +2.36%
LINK $9.07 +5.47%
HYPE $38.79 +6.93%
AAVE $94.83 +8.90%
SUI $0.9330 +7.71%
XLM $0.1600 +3.80%
ZEC $330.53 +22.70%
BTC $71,739.46 +5.06%
ETH $2,223.91 +6.84%
BNB $605.70 +0.74%
XRP $1.36 +4.41%
SOL $83.60 +5.34%
TRX $0.3181 +1.23%
DOGE $0.0935 +3.29%
ADA $0.2551 +5.49%
BCH $443.81 +2.36%
LINK $9.07 +5.47%
HYPE $38.79 +6.93%
AAVE $94.83 +8.90%
SUI $0.9330 +7.71%
XLM $0.1600 +3.80%
ZEC $330.53 +22.70%

慢雾余弦:求职者审代码中招“后门窃密”,私钥被直接扫走

2025-12-04 10:11:50
收藏

ChainCatcher 消息,慢雾余弦 @evilcos 提醒称,有 Web3 求职者在面试过程中遭遇恶意代码陷阱。事件中,攻击者冒充 @seracleofficial,要求求职者审阅并运行 Bitbucket 上的代码。受害者克隆代码后,程序立即扫描本地全部 .env 文件并窃取私钥等敏感信息。

慢雾方面指出,此类后门属于典型 stealer,可收集浏览器保存的密码、加密钱包助记词与私钥等隐私数据。专家强调,凡涉及可疑代码审查,务必在隔离环境中操作,避免在真实设备上直接运行以致遭受攻击。

app_icon
ChainCatcher 与创新者共建Web3世界