扫码下载
BTC $78,273.75 +2.36%
ETH $2,397.54 +3.30%
BNB $642.63 +1.36%
XRP $1.45 +0.98%
SOL $88.29 +2.81%
TRX $0.3346 +1.66%
DOGE $0.0980 +2.75%
ADA $0.2555 +2.11%
BCH $466.81 +4.84%
LINK $9.52 +1.20%
HYPE $41.00 +0.37%
AAVE $93.50 +0.45%
SUI $0.9701 +1.44%
XLM $0.1795 -0.70%
ZEC $320.13 -2.86%
BTC $78,273.75 +2.36%
ETH $2,397.54 +3.30%
BNB $642.63 +1.36%
XRP $1.45 +0.98%
SOL $88.29 +2.81%
TRX $0.3346 +1.66%
DOGE $0.0980 +2.75%
ADA $0.2555 +2.11%
BCH $466.81 +4.84%
LINK $9.52 +1.20%
HYPE $41.00 +0.37%
AAVE $93.50 +0.45%
SUI $0.9701 +1.44%
XLM $0.1795 -0.70%
ZEC $320.13 -2.86%

慢雾余弦:求职者审代码中招“后门窃密”,私钥被直接扫走

2025-12-04 10:11:50
收藏

ChainCatcher 消息,慢雾余弦 @evilcos 提醒称,有 Web3 求职者在面试过程中遭遇恶意代码陷阱。事件中,攻击者冒充 @seracleofficial,要求求职者审阅并运行 Bitbucket 上的代码。受害者克隆代码后,程序立即扫描本地全部 .env 文件并窃取私钥等敏感信息。

慢雾方面指出,此类后门属于典型 stealer,可收集浏览器保存的密码、加密钱包助记词与私钥等隐私数据。专家强调,凡涉及可疑代码审查,务必在隔离环境中操作,避免在真实设备上直接运行以致遭受攻击。

app_icon
ChainCatcher 与创新者共建Web3世界