Bloxflip Predictor 60% (Leaf) was reported 2026-03-31 for Malware

The reporter said:

This script is a balance stealer disguised as a "game predictor." It uses heavy obfuscation to hide malicious intent and bypass automated security scans.
Hardcoded Withdrawal Address: The obfuscated data contains a specific crypto withdrawal address: DLaoS5jWgMrmgRwJ8LfS4jMLTxVximo2U8Q.
API Abuse: Decrypting the internal strings reveals a call to the Bloxflip internal API: /api/user/crypto-service/withdraw.
Credential Theft: The script uses the POST method with credentials: "include" to hijack the user's active session and programmatically withdraw their balance to the attacker's wallet without user consent.
Misleading Description: It claims to be a "60% Win Chance" predictor to trick users into installing it, while the background logic is dedicated to exfiltrating funds.
The script functions as a balance stealer designed to drain user accounts. It utilizes heavy obfuscation to conceal a hardcoded withdrawal function. Analysis of the encoded strings indicates that the script makes unauthorized POST requests to the withdrawal API to send funds to an external wallet address. The predictor interface serves as a deceptive front to encourage users to keep the script active while it captures session tokens and initiates background transfers. This behavior constitutes a violation of policies regarding malicious code, credential theft, and deceptive practices.
The moment you run this script, it stays silent in the background. As soon as you have enough balance, it uses your browser's "session token" (which it gets because it's running on the Bloxflip site) to automatically send a withdrawal request of your funds to the developer's crypto address (DLaoS5jWg...).

This script is 100% Malware & Obfuscated Code & Undisclosed antifeature

Culty CloudBannade (the reported user) has made:

This report has been upheld by a moderator.