扫码下载
BTC $76,968.19 -1.42%
ETH $2,282.08 -2.78%
BNB $621.30 -1.81%
XRP $1.39 -2.62%
SOL $84.23 -2.66%
TRX $0.3248 +0.38%
DOGE $0.0975 -1.42%
ADA $0.2446 -3.12%
BCH $450.99 -0.15%
LINK $9.21 -2.93%
HYPE $41.93 +1.41%
AAVE $97.22 +1.55%
SUI $0.9220 -2.67%
XLM $0.1656 -3.24%
ZEC $356.74 +0.67%
BTC $76,968.19 -1.42%
ETH $2,282.08 -2.78%
BNB $621.30 -1.81%
XRP $1.39 -2.62%
SOL $84.23 -2.66%
TRX $0.3248 +0.38%
DOGE $0.0975 -1.42%
ADA $0.2446 -3.12%
BCH $450.99 -0.15%
LINK $9.21 -2.93%
HYPE $41.93 +1.41%
AAVE $97.22 +1.55%
SUI $0.9220 -2.67%
XLM $0.1656 -3.24%
ZEC $356.74 +0.67%

慢雾余弦:求职者审代码中招“后门窃密”,私钥被直接扫走

2025-12-04 10:11:50
收藏

ChainCatcher 消息,慢雾余弦 @evilcos 提醒称,有 Web3 求职者在面试过程中遭遇恶意代码陷阱。事件中,攻击者冒充 @seracleofficial,要求求职者审阅并运行 Bitbucket 上的代码。受害者克隆代码后,程序立即扫描本地全部 .env 文件并窃取私钥等敏感信息。

慢雾方面指出,此类后门属于典型 stealer,可收集浏览器保存的密码、加密钱包助记词与私钥等隐私数据。专家强调,凡涉及可疑代码审查,务必在隔离环境中操作,避免在真实设备上直接运行以致遭受攻击。

app_icon
ChainCatcher 与创新者共建Web3世界