Connect with us

Security

Unleashing the ClickFix JavaScript Attack: Hijacking Crypto Swaps

Published

on

A new ClickFix-style attack is being distributed by threat actors through Pastebin comments, targeting cryptocurrency users and manipulating their browser to hijack Bitcoin swap transactions, redirecting funds to attacker-controlled wallets.

The attack campaign uses social engineering tactics to lure victims with promises of large profits from an alleged Swapzone.io arbitrage exploit, but instead, it injects malicious JavaScript code directly into the victim’s browser to alter the swap process.

This attack is notable for potentially being the first ClickFix attack to utilize JavaScript to manipulate a webpage for malicious purposes.

Wiz

Promoted through Pastebin

Threat actors have been leveraging Pastebin posts to promote a new cryptocurrency exploit, enticing users with the promise of earning significant profits by following a link to a URL on rawtext[.]host.

The campaign has gained widespread traction, with numerous comments on Pastebin posts claiming leaked exploit documentation that could potentially earn users $13,000 in just 2 days.

Phishing comment on Pastebin
Phishing comment on Pastebin
Source: BleepingComputer

Clicking on the link in the comments redirects users to a Google Docs page titled “Swapzone.io – ChangeNOW Profit Method,” which falsely claims to provide a guide on exploiting arbitrage opportunities for higher payouts.

The deceptive guide suggests exploiting an older backend node on ChangeNOW connected to the Swapzone partner API to achieve higher payouts through a different conversion formula for certain BTC pairs.

Documents related to this scam typically show active viewers between 1 and 5 at any given time, indicating the widespread circulation of the scam.

Anonymous users viewing the Google Doc
People viewing the Google Doc
Source: BleepingComputer

The fraudulent guide instructs users to execute JavaScript directly in their browser by visiting a URL on paste[.]sh and copying a JavaScript snippet from the page.

See also  Fantasy Hub: How Telegram Became a Haven for Cybercriminals
First stage JavaScript code used in ClickFix attack
First stage JavaScript code used in ClickFix attack
Source: BleepingComputer

After copying the code, victims are instructed to return to the SwapZone tab, enter javascript: in the address bar, paste the code, and press Enter, allowing the malicious code to execute.

ClickFix attack instructions in fake SwapZone exploit guide
ClickFix attack instructions in fake SwapZone exploit guide
Source: BleepingComputer

This technique exploits the browser’s ‘javascript:’ URI feature to manipulate the Swapzone.io page and alter the swap process, allowing attackers to control the transaction details.

Analysis of the malicious script reveals that it loads a secondary payload from https://rawtext[.]host/raw?btulo3, injecting obfuscated code into the Swapzone page to override the legitimate Next.js script used for Bitcoin swaps.

The injected script includes randomly selected Bitcoin addresses, replacing legitimate deposit addresses generated by the exchange, leading victims to unknowingly send funds to attacker-controlled wallets.

In addition to address manipulation, the script alters displayed exchange rates and offer values to create the illusion of a successful arbitrage exploit.

Unfortunately, due to the irreversible nature of Bitcoin transactions, victims of this scam have no straightforward way to recover their lost funds.

A novel ClickFix variant

This campaign represents a variant of ClickFix attacks, a social engineering tactic that tricks users into executing malicious commands to install malware on their systems.

Unlike traditional ClickFix attacks that target operating systems, this campaign instructs victims to run JavaScript directly in their browser while visiting a cryptocurrency exchange service, enabling the code to intercept and manipulate transaction details.

This may be one of the first reported instances of a ClickFix-style attack designed to use JavaScript within the browser to steal cryptocurrency.

Transform the following sentence into a question:

“You are going to the party tonight.”

Are you going to the party tonight?

Trending