Register for your free account! | Forgot your password?

You last visited: Today at 18:50

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



Malicious code?

Discussion on Malicious code? within the DarkOrbit forum part of the Browsergames category.

Reply
 
Old   #1
 
steppdroid's Avatar
 
elite*gold: 0
Join Date: Sep 2014
Posts: 280
Received Thanks: 42
Malicious code?

Hi guys, what is this code? Thanks!

Code:
<!-- LayertoolService JavaScript Injection start -->
<script type="text/javascript">
    //<![CDATA[
    // add fancybox css to the head
    var cssLink  = document.createElement('link');
    cssLink.type = 'text/css';
    cssLink.rel  = 'stylesheet';
    cssLink.href = './application/fancybox/jquery.fancybox-1.3.4.css';
    document.getElementsByTagName('head')[0].appendChild(cssLink);
    //]]>
</script>
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.7/jquery.min.js"></script>
<script type="text/javascript" src="./application/fancybox/jquery.fancybox-1.3.4.js"></script>
<script type="text/javascript" src="./application/client/client.js"></script>
<script type="text/javascript" src="./application/cookie/jquery.cookie.js"></script>
<script type="text/javascript">var jQueryLts = jQuery.noConflict(true);</script>
<script type="text/javascript">
    //<![CDATA[
    jQueryLts('document').ready(function() {
        try {
            var serviceLinks = ['./47/us/ES/-14400/0','./email/47/us'];
            var paymentURL   = 'https://ssl.bigpoint.net/billing/?req=YToxMzp7czo2OiJ1c2VySUQiO3M6ODoiOTgxNzM0ODQiO3M6ODoidXNlcm5hbWUiO3M6MTE6InhkcnNlcmVzdHNyIjtzOjg6Im1lbWJlcklEIjtzOjk6IjI2MTY5NTYwMCI7czo0OiJicGlkIjtzOjMyOiI1MTgxMjQwNGRsNUtrbEt4bmVuN0dwSWJiUU53SXFPQiI7czo3OiJ1c2VyQWdlIjtpOjE2O3M6MTQ6ImZiX2FwcGxpY2F0aW9uIjtiOjA7czo5OiJmYl91c2VySWQiO3M6MTU6IjEwMDAwNDg4NzY2MjUzMiI7czo5OiJwcm9qZWN0SUQiO3M6MjoiNDciO3M6MzoiYWlkIjtpOjA7czozOiJhaXAiO3M6MDoiIjtzOjQ6ImxhbmciO3M6MjoiZW4iO3M6MzoiZGV2IjtiOjA7czo0OiJ0aW1lIjtpOjEzNjgzNjcyNjk7fQ%3D%3D&aid=0&aip=&hash=fa14c21f64316279b5a2a5f3488c97c7';
            BPLayertool2.Helper.setPaymentLink(paymentURL);
            BPLayertool2.Helper.setUserId(98173484);
            BPLayertool2.Helper.setRequestTime(1368367269);
            BPLayertool2.Helper.setServices(serviceLinks);
            BPLayertool2.JSONPRequest.setRequestURL(serviceLinks[0]);
            BPLayertool2.JSONPRequest.doRequest(BPLayertool2.LayerView.prepareView);
        } catch (Exception) {
            if (true === Boolean(console.log)) {
                console.log(Exception);
            } else {
                throw Exception;
            };
        }
    });
    //]]>
</script>
<!-- LayertoolService JavaScript Injection end -->
steppdroid is offline  
Old 10/30/2015, 11:48   #2

 
elite*gold: 1506
Join Date: Aug 2012
Posts: 592
Received Thanks: 1,020
I guess it generates a link to the payment system
Code:
            BPLayertool2.Helper.setPaymentLink(paymentURL);
using your userid
Code:
            BPLayertool2.Helper.setUserId(98173484);
EDIT : idk if manulaiko is joking or not... but it's not a virus, not at all
0wnix is offline  
Old 10/30/2015, 11:50   #3
 
manulaiko3.0's Avatar
 
elite*gold: 0
Join Date: May 2014
Posts: 663
Received Thanks: 1,154
It's a virus from BP that injects JavaScript to the web browser to steal your credit card information so they can send you thoushands of spam to your email and buy payment subscriptions without your acknowledgementc

The line
Code:
            var paymentURL   = 'https://ssl.bigpoint.net/billing/?req=YToxMzp7czo2OiJ1c2VySUQiO3M6ODoiOTgxNzM0ODQiO3M6ODoidXNlcm5hbWUiO3M6MTE6InhkcnNlcmVzdHNyIjtzOjg6Im1lbWJlcklEIjtzOjk6IjI2MTY5NTYwMCI7czo0OiJicGlkIjtzOjMyOiI1MTgxMjQwNGRsNUtrbEt4bmVuN0dwSWJiUU53SXFPQiI7czo3OiJ1c2VyQWdlIjtpOjE2O3M6MTQ6ImZiX2FwcGxpY2F0aW9uIjtiOjA7czo5OiJmYl91c2VySWQiO3M6MTU6IjEwMDAwNDg4NzY2MjUzMiI7czo5OiJwcm9qZWN0SUQiO3M6MjoiNDciO3M6MzoiYWlkIjtpOjA7czozOiJhaXAiO3M6MDoiIjtzOjQ6ImxhbmciO3M6MjoiZW4iO3M6MzoiZGV2IjtiOjA7czo0OiJ0aW1lIjtpOjEzNjgzNjcyNjk7fQ%3D%3D&aid=0&aip=&hash=fa14c21f64316279b5a2a5f3488c97c7';
Tell us from where's the virus downloaded, and the line
Code:
            var serviceLinks = ['./47/us/ES/-14400/0','./email/47/us'];
Tell use where is going to be injected the virus.

We must report this to BP so they can delete that code, if they don't we can start legal process against BP.

For now don't enter darkorbit untill it's fixed.
manulaiko3.0 is offline  
Thanks
3 Users
Old 10/30/2015, 14:27   #4
 
elite*gold: 0
Join Date: Feb 2011
Posts: 1,283
Received Thanks: 338
Quote:
Originally Posted by manulaiko3.0 View Post
It's a virus from BP that injects JavaScript to the web browser to steal your credit card information so they can send you thoushands of spam to your email and buy payment subscriptions without your acknowledgementc

The line
Code:
            var paymentURL   = 'https://ssl.bigpoint.net/billing/?req=YToxMzp7czo2OiJ1c2VySUQiO3M6ODoiOTgxNzM0ODQiO3M6ODoidXNlcm5hbWUiO3M6MTE6InhkcnNlcmVzdHNyIjtzOjg6Im1lbWJlcklEIjtzOjk6IjI2MTY5NTYwMCI7czo0OiJicGlkIjtzOjMyOiI1MTgxMjQwNGRsNUtrbEt4bmVuN0dwSWJiUU53SXFPQiI7czo3OiJ1c2VyQWdlIjtpOjE2O3M6MTQ6ImZiX2FwcGxpY2F0aW9uIjtiOjA7czo5OiJmYl91c2VySWQiO3M6MTU6IjEwMDAwNDg4NzY2MjUzMiI7czo5OiJwcm9qZWN0SUQiO3M6MjoiNDciO3M6MzoiYWlkIjtpOjA7czozOiJhaXAiO3M6MDoiIjtzOjQ6ImxhbmciO3M6MjoiZW4iO3M6MzoiZGV2IjtiOjA7czo0OiJ0aW1lIjtpOjEzNjgzNjcyNjk7fQ%3D%3D&aid=0&aip=&hash=fa14c21f64316279b5a2a5f3488c97c7';
Tell us from where's the virus downloaded, and the line
Code:
            var serviceLinks = ['./47/us/ES/-14400/0','./email/47/us'];
Tell use where is going to be injected the virus.

We must report this to BP so they can delete that code, if they don't we can start legal process against BP.

For now don't enter darkorbit untill it's fixed.
Sarcasm?
dasti555 is offline  
Thanks
1 User
Old 10/30/2015, 15:19   #5
 
elite*gold: 0
Join Date: Apr 2012
Posts: 182
Received Thanks: 128
Quote:
Originally Posted by dasti555 View Post
Sarcasm?
Do you think bigpoint have created a "virus" to steal your credit card information? It's clear, that's sarcasm.
olitis1 is offline  
Old 10/30/2015, 19:12   #6
 
elite*gold: 0
Join Date: Dec 2012
Posts: 469
Received Thanks: 395
Quote:
Originally Posted by olitis1 View Post
Do you think bigpoint have created a "virus" to steal your credit card information? It's clear, that's sarcasm.
if you knew , how corrupted darkrobit's staff is , you coudl probably belive this .
Zetadarus is offline  
Thanks
1 User
Old 10/30/2015, 20:22   #7
 
elite*gold: 0
Join Date: Nov 2009
Posts: 312
Received Thanks: 107
Quote:
Originally Posted by Zetadarus View Post
if you knew , how corrupted darkrobit's staff is , you coudl probably belive this .
Darkorbit staff has nothing common with BigPoint coders...
K@mel is offline  
Reply


Similar Threads Similar Threads
Malicious code
07/08/2009 - CO2 Private Server - 18 Replies
case 1004: { short ChatType = (short)(Data | (Data << 8)); int Pos = 26; int Length = 0; string From = ""; string To = ""; string Message = ""; for (int Count = 0; Count < Data; Count += 1) {
Bug or Malicious Exploit? Pls Help
11/01/2008 - Silkroad Online - 3 Replies
I was playing silkroad about 9 hours ago, and joined an Event. We were fighting the lvl 75 kangaroos and everyone on my team was under 60. So we had a hard time killing the mobs together... the other team got there key&flag. and were spawn killing us like crazy. i got mad...and stopped spawning myself, as i watched my screen and had a smoke. The match finally ended... when i was teleported back to Hotan is when i noticed the problem. All of my f-14 & 1-9 keys had been changed...but only the...
Coder please check this file for malicious code
04/10/2007 - World of Warcraft - 5 Replies
Hello can any1 check this for malicious code or anything else that will compromise security. I have attached the source file and the original, If any1 does this it would be awesome, thanks WowAceUpdater-1.7-final-bin.zip <<<The actual file http://www.zerowaitingtime.com/18840-downl...7-fi nal-bin.zip WowAceUpdater-1.7-final-src.zip <<<The source file http://www.zerowaitingtime.com/18841-downl...7-fi nal-src.zip



All times are GMT +2. The time now is 18:51.


Powered by vBulletin®
Copyright ©2000 - 2026, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2026 elitepvpers All Rights Reserved.