<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>halzero</title>
        <link>https://paragraph.com/@halzero</link>
        <description>Probably not a robot.</description>
        <lastBuildDate>Mon, 18 May 2026 12:48:57 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <image>
            <title>halzero</title>
            <url>https://storage.googleapis.com/papyrus_images/d0407befaab0c116b6e788b4299a1b52cb7ad0b7778a8d2d961c14566fe0d8b7.jpg</url>
            <link>https://paragraph.com/@halzero</link>
        </image>
        <copyright>All rights reserved</copyright>
        <item>
            <title><![CDATA[PancakeSwap Themed Phishing Page]]></title>
            <link>https://paragraph.com/@halzero/pancakeswap-themed-phishing-page</link>
            <guid>lHQryxAagvzp0Iksf4CT</guid>
            <pubDate>Mon, 07 Nov 2022 12:12:32 GMT</pubDate>
            <description><![CDATA[Today we are taking a look at a clone of PancakeSwap the most popular decentralized platform built on the Binance Smart Chain located at pancakeswvap.com. The domain is a lookalike of pancakeswap.com (which actually forwards to pancakeswap.finance the official domain you should be using.) The front page is a fairly good clone of PancakeSwap including a modified version of the warning bar at the top of the page urging visitors to make sure the URL is correct, something we see on many websites ...]]></description>
            <content:encoded><![CDATA[<p>Today we are taking a look at a clone of PancakeSwap <em>the most popular decentralized platform built on the Binance Smart Chain</em> located at <strong>pancakeswvap.com</strong>. The domain is a lookalike of <strong>pancakeswap.com</strong> (which actually forwards to <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://pancakeswap.finance">pancakeswap.finance</a> the official domain you should be using.)</p><p>The front page is a fairly good clone of PancakeSwap including a modified version of the warning bar at the top of the page urging visitors to make sure the URL is correct, something we see on many websites these days to help visitors avoid scams.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/9be75243edc726d93b112ae003a55574584a2386f3c49e46bb3d639773b90788.png" alt="clone of the PancakeSwap front page" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="">clone of the PancakeSwap front page</figcaption></figure><p>The page asks us to choose and connect our wallet, following a normal process familiar to all web3 users, but let&apos;s see what is going on under the hood as everything is not as it seems.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/05000724016f9a4991e742c686faabe48b1fe7689d08a9835d9d62b4cd5f4fc8.png" alt="connecting your wallet is familiar to us all" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="">connecting your wallet is familiar to us all</figcaption></figure><p>Watching the phishing page load on the left side and the real PancakeSwap page loading on the right, we can see that some extra JavaScript is loaded on the phishing page from the location /drainer/ that we don’t see while the official page is loading, unless you were watching the browser traffic you wouldn’t see any difference between the two pages as this does not change anything that you can see in the browser window as this is happening in the background.</p><p>In most browsers you can open the developer tools by pressing the F12 key and browsing a website in order to inspect the traffic between you and the website along with other features useful to web developers such as JavaScript debugging.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/e22aed8110d6f24daae558f5fcc2dcc91204aef342de9c29eeb21a2a88c4e8e9.png" alt="watching both pages load inside chrome developer tools " blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="">watching both pages load inside chrome developer tools</figcaption></figure><p>Unfortunately I&apos;m not yet familiar with the inner workings of web3 JavaScript libraries but it is safe to assume the code is used to drain the victims wallet of funds after presenting bogus signing requests that give the page more permissions to your wallet than would normally be requested by the official PancakeSwap website.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/fee87a18e9485e8f00639720b9f50ee853237a33fdba8940f73f6ae07abc53ce.png" alt="part of the JavaScript code used to drain a victims wallet" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="">part of the JavaScript code used to drain a victims wallet</figcaption></figure><p>Both the registrar of the domain and the CDN provider used to mask the real host of the site have been notified via their customer support Twitter handles. I urge you not to visit any of the phishing URLs that I show in this article I visit there pages in a controlled isolated environment, you will be putting your <strong>funds at risk of theft</strong>.</p><p>If you enjoyed this short article about a PancakeSwap phishing page then please make sure you subscribe here on Mirror and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/whoishalzero">follow me on Twitter</a> for more as well as other articles on cyber security topics. If you would like to discuss collaboration or sponsorship please reach out to me.</p><div data-type="subscribeButton" class="center-contents"><a class="email-subscribe-button" href="null">Subscribe</a></div>]]></content:encoded>
            <author>halzero@newsletter.paragraph.com (halzero)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/44a5924b832e2298467bca6642bfaf8a2c345e6ed04662887d659c328426f72a.png" length="0" type="image/png"/>
        </item>
    </channel>
</rss>