ChainCatcher reports that SlowMist’s Yu Xian (@evilcos) has issued a warning about Web3 job seekers encountering malicious code traps during interviews. In this incident, an attacker impersonated @seracleofficial and asked the candidate to review and run code from Bitbucket. After the victim cloned the code, the program immediately scanned all local .env files and stole sensitive information such as private keys. SlowMist pointed out that this type of backdoor is a typical stealer, capable of collecting browser-saved passwords, crypto wallet mnemonics, private keys, and other private data. Experts emphasize that any review of suspicious code must be conducted in an isolated environment and not run directly on a real device to avoid attacks.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
ChainCatcher reports that SlowMist’s Yu Xian (@evilcos) has issued a warning about Web3 job seekers encountering malicious code traps during interviews. In this incident, an attacker impersonated @seracleofficial and asked the candidate to review and run code from Bitbucket. After the victim cloned the code, the program immediately scanned all local .env files and stole sensitive information such as private keys. SlowMist pointed out that this type of backdoor is a typical stealer, capable of collecting browser-saved passwords, crypto wallet mnemonics, private keys, and other private data. Experts emphasize that any review of suspicious code must be conducted in an isolated environment and not run directly on a real device to avoid attacks.