掃碼下載
BTC $77,532.02 +4.36%
ETH $2,437.31 +4.78%
BNB $641.91 +2.48%
XRP $1.49 +4.66%
SOL $89.76 +4.32%
TRX $0.3261 -0.23%
DOGE $0.1008 +3.52%
ADA $0.2635 +4.31%
BCH $455.70 +3.43%
LINK $9.72 +3.54%
HYPE $44.68 +2.24%
AAVE $118.15 +6.79%
SUI $1.01 +4.17%
XLM $0.1755 +6.88%
ZEC $335.71 -0.62%
BTC $77,532.02 +4.36%
ETH $2,437.31 +4.78%
BNB $641.91 +2.48%
XRP $1.49 +4.66%
SOL $89.76 +4.32%
TRX $0.3261 -0.23%
DOGE $0.1008 +3.52%
ADA $0.2635 +4.31%
BCH $455.70 +3.43%
LINK $9.72 +3.54%
HYPE $44.68 +2.24%
AAVE $118.15 +6.79%
SUI $1.01 +4.17%
XLM $0.1755 +6.88%
ZEC $335.71 -0.62%

慢霧餘弦:求職者審碼中招“後門竊密”,私鑰被直接掃走

2025-12-04 10:11:50
收藏

ChainCatcher 消息,慢霧餘弦 @evilcos 提醒稱,有 Web3 求職者在面試過程中遭遇惡意代碼陷阱。事件中,攻擊者冒充 @seracleofficial,要求求職者審閱並運行 Bitbucket 上的代碼。受害者克隆代碼後,程序立即掃描本地全部 .env 文件並竊取私鑰等敏感信息。

慢霧方面指出,此類後門屬於典型 stealer,可收集瀏覽器保存的密碼、加密錢包助記詞與私鑰等隱私數據。專家強調,凡涉及可疑代碼審查,務必在隔離環境中操作,避免在真實設備上直接運行以致遭受攻擊。

app_icon
ChainCatcher 與創新者共建Web3世界