SlowMist Cosine: Job seeker falls victim to "backdoor data theft" while reviewing code, private key directly stolen

MarsBitNews

According to Mars Finance, SlowMist’s @evilcos has issued a warning that some Web3 job seekers have encountered malicious code traps during interviews. In these incidents, attackers impersonated @seracleofficial and asked candidates to review and run code hosted on Bitbucket. After victims cloned the code, the program immediately scanned all local .env files and stole sensitive information such as private keys. SlowMist pointed out that this type of backdoor is a typical stealer, capable of collecting browser-saved passwords, crypto wallet mnemonics, private keys, and other private data. Experts emphasize that any suspicious code review should be done in an isolated environment, and never run directly on a real device to avoid potential attacks.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.
Comment
0/400
No comments