Express
V2EX User Reports Recruitment Scam Concealing Malicious Code, Suspected of Stealing Local Private Keys
Summary: In a shocking revelation, V2EX user evada reported encountering potential security risks during a job application process. While completing a development task based on a GitHub project template, evada discovered that a .png file in the project actually contained executable code, which was called and executed by config-overrides.js. evada suspects that the code was intended ...
In a shocking revelation, V2EX user evada reported encountering potential security risks during a job application process. While completing a development task based on a GitHub project template, evada discovered that a .png file in the project actually contained executable code, which was called and executed by config-overrides.js.
evada suspects that the code was intended to steal local private keys and engage in cryptocurrency theft. The malicious code was found to send requests to a specific URL, download a trojan file, and set it to start automatically with the system, posing a high level of stealth and harm. The related original repository has been reported and deleted, with V2EX administrator Livid confirming a thorough ban on the involved account.
Tags:
Link: V2EX User Reports Recruitment Scam Concealing Malicious Code, Suspected of Stealing Local Private Keys [Copy]