0

I made a mistake - i was reached out for work regarding a project. Accidentally built it and ran it locally and it was obviously a bunch of nonsense code designed to look like a normal react project with a million unused dependencies.

What sort of malware or hostile actions could you forsee? It was a web3 project. Only thing i could forsee is, I typed in my metamask/wallet password (no money on it) to a fake metamask popup. Perhaps they keylogged it? Anyone have any recommendations, i could check to scan?

1
  • 2
    "What sort of malware or hostile actions could you forsee?" - you ask what can happen if you take code from somewhere and execute it blindly on your system (building it is also already executing instructions from the code)? Anything, no restrictions. Commented Aug 8, 2024 at 17:27

1 Answer 1

2

In general, executing code locally means that the code can do whatever you can (which is why you want to log in as a limited user as much as possible), plus it might employ some elevation of privilege exploit to also do whatever a privileged account can do, which means anything at all.

If you are paranoid and want safety and certainty, your machine is now lost. Disconnect it and nuke it and rebuild from a known clean backup. But even befor that, all your accounts are also lost. From a known clean machine, change all your passwords from all your accounts - don't check email or anything, just log in, change password and log out immediately. All machines reachable from your own must be considered suspect and audited. Those where you had administrative privileges, if you're in paranoid mode, should also be considered lost and treated the same way, recursively.

Realistically, though... you say, "I typed in my metamask/wallet password (no money on it) to a fake metamask popup". This tells me that you were offered a job working on some kind of crypto thingy. This, in turn, tells me that in all evidence someone is trolling for crypto-laden and not too paranoid developers, trying to steal their hard-won cryptocurrencies, and you were either a test or one of many victims. Assuming you weren't explicitly targeted and it's an anonymous, mass-sting operation, then accessing your wallet was exactly the only purpose of the scam. So, you compromised that information but nothing else. How much damage this may imply, that's for you to decide. If you did not reuse that password anywhere else, the attackers got nothing. Abandon that wallet and move on. Possibly some kind of remote-control malware may have been left behind (I know that I would have tried to install one), but sanitizing the machine ought to be possible without recourse to extreme measures.

You must log in to answer this question.

Start asking to get answers

Find the answer to your question by asking.

Ask question

Explore related questions

See similar questions with these tags.