What do I associate Rust with? Of course, with “No space left on device”.
This media is not supported in your browser
VIEW IN TELEGRAM
Обычный созвон в понедельник
Forwarded from Сицебрекс!
Господи я просто рыдаю! Чувак проходил верификацию в WebMoney упаковкой шампуня Schauma. А вы все про ИИ, да блокчейны… вот где тру хардкор секурити. Мое почтение 🥸
What do I associate with writing indexers for Solana? Of course, "Log truncated"!
BUIDLers: We can use NEAR for our %project% because it has very cheap transaction fees.
Holders that still waited for 100$ per 1 NEAR: 😭
Holders that still waited for 100$ per 1 NEAR: 😭
Brilliant idea.
–––
How does it work?
When hackers install malicious software on a compromised victim, they first check to make sure its safe for them to run. They don't want to get caught and avoid computers that have security analysis or anti-malware tools on them.
Scarecrow takes advantage of this, by running in the background of your computer and 'faking' these indicators. It's super lightweight and tricks malware into thinking your computer is not the place for them to be.
(source)
–––
How does it work?
When hackers install malicious software on a compromised victim, they first check to make sure its safe for them to run. They don't want to get caught and avoid computers that have security analysis or anti-malware tools on them.
Scarecrow takes advantage of this, by running in the background of your computer and 'faking' these indicators. It's super lightweight and tricks malware into thinking your computer is not the place for them to be.
(source)
Cyberscarecrow
Cyber Scarecrow
An app for scaring away malware
A nice new attack on web3 traders (hi degens 🦡).
Unlike previous attacks, where the payload was hidden in one of the project files, this time the malware is loaded from an npm dependency of an application that is distributed via thematic chat agents. In our example, the interesting package is
Github: https://github.com/idkwhatimdoingimserious/Pump-Fun-Sniper-Solana/
Npm: npmjs.com/package/sol-web3-1.45
Attacker: @ccc3666
Unlike previous attacks, where the payload was hidden in one of the project files, this time the malware is loaded from an npm dependency of an application that is distributed via thematic chat agents. In our example, the interesting package is
sol-web3-1.45
.Github: https://github.com/idkwhatimdoingimserious/Pump-Fun-Sniper-Solana/
Npm: npmjs.com/package/sol-web3-1.45
Attacker: @ccc3666