BTC $59216.7696
ETH $2969.3834
BNB $560.7921
SOL $137.2547
XRP $0.5186
stETH $2963.2064
DOGE $0.1322
TON $5.3092
ADA $0.4518
AVAX $33.5407
TRX $0.1221
wstETH $3463.2610
DOT $7.0606
WETH $2969.4867
WBTC $59237.9396
BCH $433.8678
LINK $13.5021
MATIC $0.7160
ICP $13.2896
UNI $6.9930
LTC $79.5834
DAI $0.9991
IMX $2.2155
FDUSD $1.0007
CAKE $2.5305
RNDR $7.7060
HBAR $0.1058
NEAR $6.1948
ETC $25.6065
MNT $0.9902
FIL $5.8619
PEPE $0.0000
STX $2.0679
OKB $48.5263
ATOM $8.6333
WIF $2.7443
TAO $397.5891
VET $0.0351
MKR $2741.6761
KAS $0.1046
GRT $0.2489
USDE $0.9990
XMR $122.5938
AR $34.1614
XLM $0.1095
FET $1.9976
INJ $23.2465
BTC $59216.7696
ETH $2969.3834
BNB $560.7921
SOL $137.2547
XRP $0.5186
stETH $2963.2064
DOGE $0.1322
TON $5.3092
ADA $0.4518
AVAX $33.5407
TRX $0.1221
wstETH $3463.2610
DOT $7.0606
WETH $2969.4867
WBTC $59237.9396
BCH $433.8678
LINK $13.5021
MATIC $0.7160
ICP $13.2896
UNI $6.9930
LTC $79.5834
DAI $0.9991
IMX $2.2155
FDUSD $1.0007
CAKE $2.5305
RNDR $7.7060
HBAR $0.1058
NEAR $6.1948
ETC $25.6065
MNT $0.9902
FIL $5.8619
PEPE $0.0000
STX $2.0679
OKB $48.5263
ATOM $8.6333
WIF $2.7443
TAO $397.5891
VET $0.0351
MKR $2741.6761
KAS $0.1046
GRT $0.2489
USDE $0.9990
XMR $122.5938
AR $34.1614
XLM $0.1095
FET $1.9976
INJ $23.2465
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Attackers inject malicious JS code on crypto scam sites


    While some attackers were creating cryptocurrency scam sites, others were learning how to hack them. An example of this was the Water Labbu gang, where hackers break into fraudulent websites and inject their malicious JS code into their HTML.

    The group does not come into contact with the victims and leave all social engineering to the scammers. According to analysts, Water Labbu hacked at least 45 scam websites and made about $316,000.

    After analyzing one of the hacked sites, experts discovered that the group had injected an IMG tag to load malicious Base64-encoded JS code using the “onerror” event, thereby bypassing XSS filters.

    The injected malicious code creates a script that downloads another script from the attackers' server. The last script collects TetherUSD and Ethereum wallet addresses and balances.

    If the victim's balance exceeds 0.005 ETH or 22,000 USDT, Water Labbu starts the attack by determining the target OS (Windows, Android or iOS). Then there are two scenarios for the development of events:

    • The victim has a mobile device. The malicious script then sends a transaction approval request through a dApp (Decentralized Application) that pretends to be a scam site. If the victim agrees to conduct the transaction, then the malicious script collects all the funds from the target's wallet and sends them to the Water Labbu wallet;
    • The victim has a Windows device. In this case, the hacked sites show a fake Flash Player update notification overlaid on the scam site. By agreeing to the “upgrade”, the target is actually downloading the backdoor. This backdoor is used to steal crypto wallet data and cookies from the victim's device.

    Despite all these machinations, the outcome for the victims is the same: the loss of all their cryptocurrency. The money just goes not to the creators of the scam site, but to Water Labbu.

    Author DeepWeb
    What is the new ProxyNotShell exploit capable of?
    Intel Alder Lake processor source code leaked online

    Comments 0

    Add comment