Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy
BTCBTC
💲70472.80
-
2.56%
ETHETH
💲2066.32
-
2.75%
SOLSOL
💲86.78
-
3.27%
TRUMPTRUMP
💲3.89
+
3.73%
USDCUSDC
💲0.9998
-
0.01%
DOGEDOGE
💲0.09420
-
4.43%

sudo rm -rf --no-preserve-root /
sudo rm -rf --no-preserve-root /|7月 04, 2025 12:39
So someone contacts you on LinkedIn with a promising job opportunity. Sounds nice, innit? They seem legit (after checking them for 1 min) and after some short convo they send you a GitHub repo with a simple Next.js "recruiting task". You clone it, run it… and 10 mins later, your device is fully compromised as you find out that your hot wallets were drained. Ok, what happened? Given the fact that we (= SEAL 911) have seen this attack over and over again, let me disclose some of the most important details: - first, the most important caveat: do NOT run random code some random dude sent you. Honestly, fucking don't. - check always the _executable_ config files of the repos thoroughly. In this particular case, the `next.config.js` file had a large padding hiding the malicious payload far to the right. - always scroll horizontally - just because you don't see anything malicious when you look at the content doesn't mean it's clean. Important: Malicious code can be hidden within files you trust, just not where you expect it. I really hope this tweet reaches enough people to prevent at least a few future victims from falling for this kind of attack.
+6
Mentioned
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Timeline

8月 02, 07:04【Malicious software steals bank account information of Android users】
8月 01, 20:07【Chainlink's Cross Chain Identity and Automated Compliance Engine Transformation ERC-3643】
8月 01, 12:00【Bitcoin Code Management and Hacker Attacks】
8月 01, 06:52【IOS Emergency Update Resolves Safari and Chrome Vulnerabilities】
7月 31, 17:20【Cold start attack method for freezing RAM with liquid helium】
7月 31, 08:30【DeFi security has just been upgraded】
7月 31, 05:12【Malicious software JSCEAL impersonates encrypted applications】
7月 29, 14:00【EPBS and FOCIL compatibility demonstration】
7月 28, 09:53【SuperRare exploit leads to Merkle root being modified】
7月 28, 03:57【Hacker group disguises recruitment in V2EX for poisoning】

HotFlash

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink

Hot Reads