-
-
#2
Posted 21 August 2019 - 10:52 AM
"Console" or "Inspect element" scam (phishing)
This is being spread both through .pdf files and regular threads. The scammer wants you to copy an encrypted code from a page - like pastebin, throwbin - and paste it on a target check-out page. Example:
Once the code is pasted into the browser's console, the legitimate check-out page is replaced with two simple strings: a crypto-address and "Awaiting payment... (0/3 Confirmations)".
Threads usually have a clickbait title like "REFUND BTC METHOD 600$ PERDAY" - "G2A REFUNDING" - "FREE CHATURBATE TOKENS". The average OP is a new account with little to no posts.
The scammer owns the crypto-address and you are sending money to his wallet, there is no real payment processor. The code itself isn't infected, but it's a phishing attempt.
The code is being edited to make the method look like more realistic. Lately a check on the page url has been added to prevent people from pasting it on any other page to test it.
Do not paste anything into your console if you do not know exactly what the code does, do not trust anyone - any real check-out glitch would get patched immediately.
If you see any phishing attempt like this one, report it and move on. Multi accounts have been used to post fake positive vouches, report them as well.
thanks for the heads up
#3
Posted 21 August 2019 - 10:56 AM
#6
Posted 22 August 2019 - 12:28 PM
#8
Posted 22 August 2019 - 01:10 PM
Users browsing this thread: