Pastebin comments push ClickFix JavaScript attack to hijack crypto swaps

Pastebin comments push ClickFix JavaScript attack to hijack crypto swaps

Sophisticated ClickFix Attack Hijacks Crypto Swaps via Malicious JavaScript Injection

In a chilling new evolution of the ClickFix social engineering playbook, cybercriminals are weaponizing browser JavaScript to hijack cryptocurrency transactions in real time—marking what may be the first documented instance of JavaScript-based ClickFix malware designed specifically to steal digital assets.

The Scam: From Pastebin Comments to Empty Wallets

The attack begins innocuously enough: threat actors flood Pastebin comment sections with promises of a “leaked” Swapzone.io exploit that allegedly delivers $13,000 in just two days through arbitrage manipulation. These comments link to what appears to be a legitimate Google Docs guide titled “Swapzone.io – ChangeNOW Profit Method.”

The bait? A technical-sounding explanation about how “Node v1.9” supposedly allows 38% higher Bitcoin payouts through an older backend integration. The document typically shows 1-5 anonymous viewers at any moment, lending a veneer of credibility.

The Execution: Browser-Based Deception

Victims are instructed to visit Swapzone.io and execute a malicious JavaScript snippet directly in their browser’s address bar—a technique that abuses the javascript: URI scheme to run code within the context of the visited website.

The process unfolds in two stages:

  1. First Payload: Users copy JavaScript from paste[.]sh
  2. Injection: They paste it into Swapzone.io’s address bar after typing javascript:

Once executed, this script loads a heavily obfuscated secondary payload from rawtext[.]host, which then injects itself into Swapzone’s legitimate Next.js framework—specifically targeting the Bitcoin swap functionality.

The Theft: Invisible Address Swapping

The malicious code performs several critical functions:

  • Address Hijacking: Replaces the legitimate Bitcoin deposit address with attacker-controlled wallets
  • Rate Manipulation: Alters displayed exchange rates and offer values to maintain the illusion of a working exploit
  • Interface Preservation: Keeps the Swapzone UI fully functional, making detection nearly impossible

Victims see what appears to be a successful transaction, but their Bitcoin is silently rerouted to criminals’ wallets—and because cryptocurrency transactions are irreversible, the funds are gone forever.

Why This Matters: A New Class of ClickFix Attack

Security researchers note this represents a significant evolution in ClickFix methodology. Traditional ClickFix attacks target operating systems through PowerShell or shell commands, but this variant exploits browser-based trust relationships.

By executing JavaScript within the Swapzone session, attackers can:

  • Bypass security warnings
  • Maintain complete control over the user interface
  • Execute transactions without triggering typical malware detection

The campaign’s scale is concerning, with multiple Pastebin posts receiving identical phishing comments over the past week, suggesting an active and ongoing operation.

Protection: The Golden Rule of Crypto

This attack underscores a fundamental principle in cryptocurrency security: never execute untrusted code in your browser, especially when financial transactions are involved. Legitimate services will never ask users to paste JavaScript into address bars or modify their own interfaces.

The sophistication of this attack—combining social engineering, code injection, and real-time transaction manipulation—represents a dangerous new frontier in cryptocurrency theft, where the line between legitimate service and malicious takeover becomes invisible to the victim.


Tags: ClickFix, JavaScript injection, cryptocurrency theft, Swapzone, Bitcoin scam, browser exploitation, social engineering, crypto fraud, irreversible transactions, malicious code, address hijacking, arbitrage scam, Pastebin phishing, digital asset security, browser-based malware, crypto security, transaction hijacking, JavaScript URI abuse, cryptocurrency exchange, online fraud

Viral Phrases: “Your Bitcoin just vanished”, “The scam you can’t see coming”, “When your browser becomes the thief”, “The $13,000 promise that empties your wallet”, “JavaScript that steals your crypto”, “The invisible transaction hijack”, “Your browser, your enemy”, “The scam that looks exactly like success”, “Once it’s gone, it’s gone forever”, “The new face of crypto theft”, “Trust no code, trust no promise”, “The exploit that isn’t really an exploit”, “Your interface is lying to you”, “The browser-based bank heist”, “The scam that’s too clever to fail”

,

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *