Threat actors abuse Pastebin for ClickFix scam on crypto swaps

Threat actors are using comments on Pastebin to promote a scam that tricks cryptocurrency users into running malicious JavaScript on Swapzone.io, hijacking Bitcoin transactions. The attack, a variant of ClickFix techniques, redirects funds to attacker-controlled wallets while mimicking legitimate arbitrage profits. This appears to be the first known instance of such a browser-based ClickFix targeting crypto exchanges.

On February 15, 2026, BleepingComputer reported a campaign where attackers post comments on various Pastebin entries, claiming to share "leaked exploit documentation" for earning $13,000 in two days through a supposed arbitrage flaw on Swapzone.io. These comments link to a URL on rawtext[.]host, which redirects to a Google Docs page titled "Swapzone.io – ChangeNOW Profit Method." The document falsely describes exploiting an outdated backend node on ChangeNOW, connected via Swapzone's API.

The guide quotes: "ChangeNOW still has an older backend node connected to the Swapzone partner API. On direct ChangeNOW, this node is no longer used for public swaps." It further claims: "However, when accessed through Swapzone, the rate calculation passes through Node v1.9 for certain BTC pairs. This old node applies a different conversion formula for BTC to ANY, which results in ~38% higher payouts than intended."

Victims are instructed to visit paste[.]sh, copy a JavaScript snippet, return to Swapzone.io, and execute it by typing "javascript:" in the browser's address bar followed by the code, then pressing Enter. This leverages the browser's 'javascript:' URI to run the script on the loaded page.

Analysis reveals the script loads an obfuscated payload from https://rawtext[.]host/raw?btulo3, which injects into Swapzone's Next.js interface. It replaces legitimate deposit addresses with attacker-controlled Bitcoin wallets and alters displayed exchange rates to simulate the promised profits. Users see a normal interface but send funds to scammers.

This scam adapts ClickFix attacks—typically used to run OS commands for malware installation—into a browser-focused method to intercept crypto swaps. As Bitcoin transactions are irreversible, affected users have no straightforward recovery options. The campaign has been active over the past week, with documents showing 1 to 5 viewers at a time.

Artikel Terkait

Illustration depicting hackers hijacking Linux Snap Store apps to steal cryptocurrency recovery phrases, featuring a compromised Ubuntu laptop and digital seed phrase theft.
Gambar dihasilkan oleh AI

Penyerang rampas aplikasi Snap Store Linux untuk mencuri frasa kripto

Dilaporkan oleh AI Gambar dihasilkan oleh AI

Penjahat siber telah membobol aplikasi Linux tepercaya di Snap Store dengan merebut domain kadaluarsa, memungkinkan mereka mendorong malware yang mencuri frasa pemulihan kripto. Pakar keamanan dari SlowMist dan kontributor Ubuntu Alan Pope menyoroti serangan tersebut, yang menargetkan akun penerbit mapan untuk mendistribusikan pembaruan berbahaya yang menyamar sebagai dompet populer. Canonical telah menghapus snap yang terkena dampak, tetapi seruan untuk pengamanan yang lebih kuat terus berlanjut.

Sepuluh paket npm dengan kesalahan ketik yang disengaja, diunggah pada 4 Juli 2025, ditemukan mengunduh infostealer yang menargetkan data sensitif di sistem Windows, Linux, dan macOS. Paket-paket ini, yang meniru pustaka populer, menghindari deteksi melalui beberapa lapisan ofusaksi dan mengumpulkan hampir 10.000 unduhan. Perusahaan keamanan siber Socket melaporkan ancaman tersebut, mencatat bahwa paket-paket tersebut masih tersedia di registry.

Dilaporkan oleh AI

Vulnerabilitas kritis di React Server Components, yang dikenal sebagai React2Shell dan dilacak sebagai CVE-2025-55182, sedang dieksploitasi secara aktif untuk menyebarkan backdoor Linux baru bernama PeerBlight. Malware ini mengubah server yang disusupi menjadi node proxy dan command-and-control yang tersembunyi. Penyerang menggunakan satu permintaan HTTP yang dibuat khusus untuk menjalankan kode sewenang-wenang pada aplikasi Next.js dan React yang rentan.

Para ahli telah memperingatkan bahwa serangan phishing kini muncul di komentar LinkedIn. Peretas mengeksploitasi bagian komentar platform untuk mendistribusikan malware. Pengguna disarankan untuk tetap waspada terhadap tautan mencurigakan dalam interaksi ini.

Dilaporkan oleh AI

Aktor ancaman zeta88 sedang mempromosikan operasi ransomware-as-a-service baru bernama The Gentlemen's RaaS di forum hacking, menargetkan sistem Windows, Linux, dan ESXi. Platform ini menawarkan afiliasi 90 persen dari pembayaran tebusan dan menampilkan alat enkripsi lintas platform yang dikembangkan dalam Go dan C. Perkembangan ini menyoroti komersialisasi berkelanjutan ransomware canggih yang menargetkan lingkungan perusahaan.

Physical assaults known as wrench attacks against cryptocurrency holders are increasing in number and severity, according to recent analyses. These incidents correlate with fluctuations in crypto market values, prompting calls for enhanced personal security measures. While overall risks to individual holders may be decreasing, the trend highlights vulnerabilities in self-custody practices.

Dilaporkan oleh AI

Hackers have targeted Waltio, a French cryptocurrency accounting platform, demanding a ransom after stealing emails and tax reports from 50,000 customers. The company reported the incident on January 21, 2026, stating that no passwords or highly sensitive data were compromised. French authorities are now investigating the sophisticated cyberattack.

 

 

 

Situs web ini menggunakan cookie

Kami menggunakan cookie untuk analisis guna meningkatkan situs kami. Baca kebijakan privasi kami untuk informasi lebih lanjut.
Tolak