V2EX users revealed that a recruitment project contained malicious code, suspected of stealing cryptocurrency assets

2025/07/28 07:42

PANews reported on July 28 that according to the V2EX website, user evada recently posted that during the application process, he was asked to use the GitHub project template specified by the recruiter to develop a page, and found that there was malicious code in the project. Specifically, the logo.png file in the project is a picture on the surface, but it actually contains executable code, and is triggered to execute through the config-overrides.js file, with the intention of stealing the user's local cryptocurrency private key.

evada pointed out that the malicious code will send a request to a specific URL, download the Trojan file and set it to start automatically at boot, which is extremely hidden and harmful. V2EX administrator Livid said that the account involved has been banned, and GitHub has also deleted the relevant malicious repository. Many users commented that this new type of fraud targeting programmers is extremely confusing, reminding developers to be vigilant when running projects of unknown origin.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.