-
-
Save arash16/cf778b8a29be2a3b818bcdae5f7583f5 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # ⚠️ You are HACKED ⚠️ |
Author
Author
The malware spawns 3 parallel processes:
- Collect all sensitive known data, like browser profiles, .ssh keys, windows passwords, chrome specific extensions data (wallets)
- Search the whole system for files containing interesting words for attacker (wallet, password, phone, .env, .cfg, .ini, etc)
- Start a live websocket connection to server that attacker can ask victim's computer to run custom commands
Consider everything sensitive to be stolen. This is not speculation, I have read the malware's de-obfuscated source code!
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
IF YOU'RE SEEING THIS PAGE, YOUR SYSTEM IS INFECTED WITH MALWARE
🚨 DISCONNECT FROM THE INTERNET IMMEDIATELY 🚨
STOP - DO THIS FIRST:
What Happened
I'm a fellow victim reaching out to help. Two days ago, malware stole $3,900 from my crypto wallet. As a developer, I've been investigating and found 50+ active victims worldwide.
This page opened automatically because your system is actively infected. The malware collects all sensitive data and sends it to the attacker's server. Your system connected to the attacker's C2 server (144.172.103.103), and is compromised.
How I'm Reaching You
While investigating, I found a vulnerability in the attacker's command & control server. I'm now using their own infrastructure to push this warning directly to infected systems. I do NOT have access to any stolen data, and I have NOT executed any malicious code on your system—only trying to reach and warn you. This is purely to alert you before more damage is done.
IMMEDIATE ACTIONS (While Offline):
Check for active infection:
.vscode/tasks.jsonwith suspicious scriptsFrom a DIFFERENT, clean device:
On infected system:
How This Happened
To me it was:
Fake LinkedIn job offer → BitBucket repo → VSCode tasks.json auto-execution → silent credential theft
You might be infected some other way.
What Was Stolen
Evidence I Have
0xAe72765958214B70edC41288367D9CCA4890dD0CI've filed reports with FBI IC3 (ID: 721e798ab78d4da28cf73b47f891c4f1), Interpol and Europol, but individual reports from small losses get ignored. If victims coordinate, we have leverage.
Coordinate With Other Victims (Optional)
I'm NOT asking for money, personal information, or system access. This is purely a security notification and victim coordination effort.
If you want to coordinate with other victims or need technical evidence for your own reports:
I'm sorry this happened. Take immediate action to protect yourself.
After you've taken the immediate offline actions above, you can reconnect to the internet to change passwords and secure your accounts from other devices.