🌕 Gate Square · Mid-Autumn Creator Incentive Program is Now Live!
Share your creations with trending topics and get a chance to split $5,000 in rewards! 🎁
👉 Join now: https://www.gate.com/campaigns/1953
💡 How to Join:
1️⃣ Post with the hashtag #Gate Square Mid Autumn Creator Incentive# .
2️⃣ Your content should follow the daily trending topics posted by [Gate _Square], and include both hashtags.
3️⃣ The more posts, higher quality, and greater engagement — the bigger your rewards! 🚀
💰 Creator Rewards:
🏆 Top 1: Bulgari Mid-Autumn Gift Box + $100 Futures Voucher + $100 GT
🥈 Top 2: Bulgari
V2EX users expose a recruitment project hiding malicious code, suspected of stealing Crypto Assets.
PANews, July 28 news, according to V2EX website, user evada recently posted that during the job application process, they were required to use a GitHub project template specified by the recruiting party to develop the page, and found that the project contained malicious code. Specifically, the logo.png file in the project appears to be an image, but actually contains executable code, which is triggered for execution through the config-overrides.js file, with the intent to steal the user's local Crypto Assets Private Key. Evada pointed out that the malicious code sends requests to specific URLs, downloads trojan files, and sets them to start automatically on boot, exhibiting a high level of concealment and harm. V2EX administrator Livid stated that the involved accounts have been banned, and GitHub has also deleted the related malicious repositories. Several users commented that this type of new scam targeting programmers is highly deceptive, reminding developers to be vigilant when running projects from unknown sources.