A Web3 job applicant reported that they were asked by @seracleofficial to clone and run project code on Bitbucket, which led to the execution of malicious software on their machine. This resulted in the scanning of sensitive files, including .env files containing private keys. SlowMist's Cosine highlighted that this type of backdoor, known as a "stealer," can collect locally stored browser passwords and encrypted mnemonic/private key information from wallet extensions. Cosine advised that malicious code analysis should be conducted in isolated environments and noted the discovery of new exploitation techniques, which are currently under internal investigation.