Threat actors abuse Pastebin for ClickFix scam on crypto swaps

Threat actors are using comments on Pastebin to promote a scam that tricks cryptocurrency users into running malicious JavaScript on Swapzone.io, hijacking Bitcoin transactions. The attack, a variant of ClickFix techniques, redirects funds to attacker-controlled wallets while mimicking legitimate arbitrage profits. This appears to be the first known instance of such a browser-based ClickFix targeting crypto exchanges.

On February 15, 2026, BleepingComputer reported a campaign where attackers post comments on various Pastebin entries, claiming to share "leaked exploit documentation" for earning $13,000 in two days through a supposed arbitrage flaw on Swapzone.io. These comments link to a URL on rawtext[.]host, which redirects to a Google Docs page titled "Swapzone.io – ChangeNOW Profit Method." The document falsely describes exploiting an outdated backend node on ChangeNOW, connected via Swapzone's API.

The guide quotes: "ChangeNOW still has an older backend node connected to the Swapzone partner API. On direct ChangeNOW, this node is no longer used for public swaps." It further claims: "However, when accessed through Swapzone, the rate calculation passes through Node v1.9 for certain BTC pairs. This old node applies a different conversion formula for BTC to ANY, which results in ~38% higher payouts than intended."

Victims are instructed to visit paste[.]sh, copy a JavaScript snippet, return to Swapzone.io, and execute it by typing "javascript:" in the browser's address bar followed by the code, then pressing Enter. This leverages the browser's 'javascript:' URI to run the script on the loaded page.

Analysis reveals the script loads an obfuscated payload from https://rawtext[.]host/raw?btulo3, which injects into Swapzone's Next.js interface. It replaces legitimate deposit addresses with attacker-controlled Bitcoin wallets and alters displayed exchange rates to simulate the promised profits. Users see a normal interface but send funds to scammers.

This scam adapts ClickFix attacks—typically used to run OS commands for malware installation—into a browser-focused method to intercept crypto swaps. As Bitcoin transactions are irreversible, affected users have no straightforward recovery options. The campaign has been active over the past week, with documents showing 1 to 5 viewers at a time.

Awọn iroyin ti o ni ibatan

Illustration depicting hackers hijacking Linux Snap Store apps to steal cryptocurrency recovery phrases, featuring a compromised Ubuntu laptop and digital seed phrase theft.
Àwòrán tí AI ṣe

Attackers hijack Linux Snap Store apps to steal crypto phrases

Ti AI ṣe iroyin Àwòrán tí AI ṣe

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

Security researchers at Cyble have discovered a new Linux malware called ClipXDaemon, which hijacks cryptocurrency wallet addresses by altering clipboard content on X11-based systems. The malware operates without command-and-control servers, monitoring and replacing addresses in real time to redirect funds to attackers. It uses a multi-stage infection process and employs stealth techniques to evade detection.

Ti AI ṣe iroyin

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

A new Linux botnet named SSHStalker is exploiting cloud servers for profit by employing the ancient IRC protocol. It targets Linux servers through automated scans, cron jobs, and IRC communications. The operation revives old-school methods to cut costs, as reported by TechRadar.

Ti AI ṣe iroyin

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

Ojú-ìwé yìí nlo kuki

A nlo kuki fun itupalẹ lati mu ilọsiwaju wa. Ka ìlànà àṣírí wa fun alaye siwaju sii.
Kọ