Threat actors abuse Pastebin for ClickFix scam on crypto swaps

Threat actors are using comments on Pastebin to promote a scam that tricks cryptocurrency users into running malicious JavaScript on Swapzone.io, hijacking Bitcoin transactions. The attack, a variant of ClickFix techniques, redirects funds to attacker-controlled wallets while mimicking legitimate arbitrage profits. This appears to be the first known instance of such a browser-based ClickFix targeting crypto exchanges.

On February 15, 2026, BleepingComputer reported a campaign where attackers post comments on various Pastebin entries, claiming to share "leaked exploit documentation" for earning $13,000 in two days through a supposed arbitrage flaw on Swapzone.io. These comments link to a URL on rawtext[.]host, which redirects to a Google Docs page titled "Swapzone.io – ChangeNOW Profit Method." The document falsely describes exploiting an outdated backend node on ChangeNOW, connected via Swapzone's API.

The guide quotes: "ChangeNOW still has an older backend node connected to the Swapzone partner API. On direct ChangeNOW, this node is no longer used for public swaps." It further claims: "However, when accessed through Swapzone, the rate calculation passes through Node v1.9 for certain BTC pairs. This old node applies a different conversion formula for BTC to ANY, which results in ~38% higher payouts than intended."

Victims are instructed to visit paste[.]sh, copy a JavaScript snippet, return to Swapzone.io, and execute it by typing "javascript:" in the browser's address bar followed by the code, then pressing Enter. This leverages the browser's 'javascript:' URI to run the script on the loaded page.

Analysis reveals the script loads an obfuscated payload from https://rawtext[.]host/raw?btulo3, which injects into Swapzone's Next.js interface. It replaces legitimate deposit addresses with attacker-controlled Bitcoin wallets and alters displayed exchange rates to simulate the promised profits. Users see a normal interface but send funds to scammers.

This scam adapts ClickFix attacks—typically used to run OS commands for malware installation—into a browser-focused method to intercept crypto swaps. As Bitcoin transactions are irreversible, affected users have no straightforward recovery options. The campaign has been active over the past week, with documents showing 1 to 5 viewers at a time.

ተያያዥ ጽሁፎች

Illustration depicting hackers hijacking Linux Snap Store apps to steal cryptocurrency recovery phrases, featuring a compromised Ubuntu laptop and digital seed phrase theft.
በ AI የተሰራ ምስል

Attackers hijack Linux Snap Store apps to steal crypto phrases

በAI የተዘገበ በ AI የተሰራ ምስል

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

በAI የተዘገበ

A critical vulnerability in React Server Components, known as React2Shell and tracked as CVE-2025-55182, is being actively exploited to deploy a new Linux backdoor called PeerBlight. This malware turns compromised servers into covert proxy and command-and-control nodes. Attackers use a single crafted HTTP request to execute arbitrary code on vulnerable Next.js and React applications.

Experts have warned that phishing attacks are now appearing in LinkedIn comments. Hackers are exploiting the platform's comment sections to distribute malware. Users are advised to stay vigilant against suspicious links in these interactions.

በAI የተዘገበ

Threat actor zeta88 is promoting a new ransomware-as-a-service operation called The Gentlemen's RaaS on hacking forums, targeting Windows, Linux, and ESXi systems. The platform offers affiliates 90 percent of ransom payments and features cross-platform encryption tools developed in Go and C. This development highlights the ongoing commercialization of sophisticated ransomware targeting enterprise environments.

Physical assaults known as wrench attacks against cryptocurrency holders are increasing in number and severity, according to recent analyses. These incidents correlate with fluctuations in crypto market values, prompting calls for enhanced personal security measures. While overall risks to individual holders may be decreasing, the trend highlights vulnerabilities in self-custody practices.

በAI የተዘገበ

Hackers have targeted Waltio, a French cryptocurrency accounting platform, demanding a ransom after stealing emails and tax reports from 50,000 customers. The company reported the incident on January 21, 2026, stating that no passwords or highly sensitive data were compromised. French authorities are now investigating the sophisticated cyberattack.

 

 

 

ይህ ድረ-ገጽ ኩኪዎችን ይጠቀማል

የእኛን ጣቢያ ለማሻሻል ለትንታኔ ኩኪዎችን እንጠቀማለን። የእኛን የሚስጥር ፖሊሲ አንብቡ የሚስጥር ፖሊሲ ለተጨማሪ መረጃ።
ውድቅ አድርግ