Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   389

Security Alert Do not contact or talk to him.

by muelasrag - 14 September, 2025 - 06:55 AM
This post is by a banned member (muelasrag) - Unhide
muelasrag  
Registered
380
Posts
15
Threads
1 Year of service
#1
(This post was last modified: 14 September, 2025 - 06:57 AM by muelasrag.)
[Image: 8bc36ef90b5e4e11ac4277e30c849a51.png?X-A...167abace27]What we found after decodingAfter applying the XOR decryption (key = 92), the first readable strings appeared:
  •  
    Code:
    [color=#c0392b][size=x-large]bc1qn0wcdzggzu0lzx92g6fgae54pdr3wv75r9yszp[/size][/color]
    This is a Bitcoin wallet address (Bech32)
  •  
    Code:
    [color=#c0392b][size=x-large]appendChild[/size][/color]
    → A JavaScript DOM function (used to add elements into the page)
  •  
    Code:
    [color=#c0392b][size=x-large]hostname[/size][/color]
    → Refers to
    Code:
    [color=#c0392b][size=x-large]location.hostname[/size][/color]
    (the website’s host name)
  • The rest are numeric/technical values related to its operations.

ConclusionThe script does the following:
  1. It contains a hardcoded Bitcoin wallet address (
    Code:
    [color=#c0392b][size=x-large]bc1q...[/size][/color]
    ).
    ➝ Meaning: when it manipulates form inputs, it replaces the user’s wallet address with the attacker’s wallet.

  2. It uses DOM APIs (
    Code:
    [color=#c0392b][size=x-large]appendChild[/size][/color]
    ,
    Code:
    [color=#c0392b][size=x-large]hostname[/size][/color]
    , …) to add or change elements in the page dynamically.
  3. It runs periodically (via
    Code:
    [color=#c0392b][size=x-large]setInterval[/size][/color]
    ) to reapply the same manipulations continuously.

⚠️ Final Summary:
This script is a malicious injection for stealing cryptocurrency:
  • It monitors crypto input fields.
  • It swaps the victim’s address with the attacker’s address:
    Code:
    [color=#c0392b][size=x-large]bc1qn0wcdzggzu0lzx92g6fgae54pdr3wv75r9yszp[/size][/color]
    .
  • It injects fake UI elements (e.g., copy buttons) to trick the user into copying the wrong address.

A malicious script is replacing wallet addresses with the attacker’s:
 
Code:
[color=#c0392b][size=large][font=Comic Sans MS,cursive]bc1qn0wcdzggzu0lzx92g6fgae54pdr3wv75r9yszp[/font][/size][/color]
[Image: WALLPAPER.jpg]
This post is by a banned member (muelasrag) - Unhide
muelasrag  
Registered
380
Posts
15
Threads
1 Year of service
Bumped #2
(This post was last modified: 14 September, 2025 - 07:02 AM by muelasrag.)
[Image: 989517874.png]..

This is a bump
[Image: WALLPAPER.jpg]

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)