PANews, August 9th news, according to SlowMist, a community member was recently asked to clone a GitHub repository locally during an interview with a Web3 team claiming to be from Ukraine, and the member wisely declined.
Analysis shows that this code repository contains a backdoor that, if cloned and executed, will load malicious code, install harmful dependencies, steal sensitive browser and wallet data (such as Chrome extension storage and potential mnemonic phrases), and leak it to the attacker’s server. This is a scam that traps individuals with job opportunities. Stay vigilant and never run code from unverified sources.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
A certain Web3 team claiming to be from Ukraine lured members under the guise of an interview to clone malicious code.
PANews, August 9th news, according to SlowMist, a community member was recently asked to clone a GitHub repository locally during an interview with a Web3 team claiming to be from Ukraine, and the member wisely declined. Analysis shows that this code repository contains a backdoor that, if cloned and executed, will load malicious code, install harmful dependencies, steal sensitive browser and wallet data (such as Chrome extension storage and potential mnemonic phrases), and leak it to the attacker’s server. This is a scam that traps individuals with job opportunities. Stay vigilant and never run code from unverified sources.