Clyra Capital Fraud Infrastructure
JavaScript Component Analysis (Enhanced)

⚠️ WARNING - PUBLIC ADVISORY

This report is released publicly to protect potential victims from the Clyra Capital cryptocurrency investment fraud. Please share freely with anyone who may be targeted by cryptocurrency investment scams.

Executive Summary

This document provides a comprehensive technical analysis of the JavaScript infrastructure deployed by the Clyra Capital cryptocurrency investment fraud operation, enhanced with live console capture data and API endpoint discovery. The analysis covers four primary JavaScript components discovered on the alternate domain clyracapital.vip, registered November 13, 2025, immediately following the neutralization of their primary domain.

Key Findings

Finding Severity Description
DOM-based XSS Vulnerability CRITICAL Unsanitized user input in SVG/MathML contexts
Advanced Gamification System HIGH Sophisticated psychological manipulation infrastructure
Persistent Engagement Hooks HIGH Multiple fallback mechanisms to maintain victim engagement
Backend API Exposure HIGH Complete API endpoint structure discovered in production code
Link Manipulation System MEDIUM Automated lottery link interception and replacement
Production Debug Logging MEDIUM Extensive console.log() statements leak operational details
Asset Management Negligence LOW Unmodified stock photo filenames expose rushed deployment

THREAT ASSESSMENT

This infrastructure demonstrates sophisticated social engineering combined with catastrophically amateur security practices. Threat actors show persistence (immediate domain re-registration) but lack even basic operational security discipline. Production deployment includes verbose debug logging, exposed API structure, and unchanged stock imagery filenames creating a comprehensive operational intelligence goldmine for defenders.

Infrastructure Overview

Component Architecture

The Clyra Capital scam infrastructure consists of four primary JavaScript components working in concert to create a comprehensive victim engagement and manipulation system. Each component serves a specific role in the overall scam operation:

Component File Primary Function Lines of Code
Main Application scam-site.js Vue.js 3.5.13 frontend framework 46,600+
Configuration config.js API endpoint configuration (obfuscated) 12
Voting System pk-vote-integration.js Gamification and engagement tracking 260
Lottery System lucky-draw-links.js Link manipulation and user tracking 140

Operational Security Failures

1. Production Debug Logging (CRITICAL OPSEC FAILURE)

Live console capture reveals the scammers deployed with ALL debug logging enabled, providing real-time operational intelligence to anyone with browser developer tools:

Captured Console Output:

12:02:58.096 PK Integration - Starting initialization... 12:02:58.121 LuckyDrawLinks - Smart init, document state: loading 12:02:58.385 LuckyDrawLinks - Initializing system... 12:02:58.387 LuckyDrawLinks - Processing links... 12:02:58.387 LuckyDrawLinks - Found 1 lottery links 12:02:58.388 LuckyDrawLinks - Replacing link: Object { originalHref: "https://www.clyracapital.vip/lottery", targetHref: "https://www.clyracapital.vip/workSpace/LuckyDraw/" } 12:02:58.389 LuckyDrawLinks - Link replaced successfully 12:02:58.437 PK Integration - Page loaded
Impact: This leaks exact system initialization sequence, link manipulation mechanics in real-time, route detection patterns, complete operational workflow, and error conditions with retry logic.

Route Polling Evidence:

12:02:59.443 PK Integration - Route Check: {...} 12:03:00.454 PK Integration - Route Check: {...} 12:03:01.439 PK Integration - Route Check: {...} 12:03:03.497 PK Integration - Route Check: {...}

The 1000ms interval polling is clearly visible, confirming the persistent monitoring mechanism.

2. Complete API Endpoint Exposure

The production codebase contains hardcoded API endpoints with zero obfuscation:

check_invite_code: `${bn}/public/api/prize/check_invite_code`, prizeList: `${bn}/public/api/prize/list`, lottery: `${bn}/public/api/prize/lottery`, prizeRecord: `${bn}/public/api/prize/prize_record`, winningRecord: `${bn}/public/api/prize/winning_record`

Backend Structure Revealed:

Impact: Complete API structure mapped without penetration testing, endpoint functionality clearly labeled, no authentication obfuscation visible, and direct testing targets identified.

3. Unmodified Stock Photo Filenames

The site uses completely unmodified stock photography with descriptive original filenames:

/img/diverse-group-of-colleagues-around-table.webp /img/hiker-looking-at-mountain-range.webp /img/wmus-home-page-soccer-hero.webp /img/man-shopping-for-suits.webp /img/mature-art-gallery-manager-writing-notes-3210x2140-1.webp /img/children-on-seesaw-in-park.webp

OPSEC Analysis:

Psychological Implication: Threat actors invested in sophisticated Vue.js frontend development but couldn't spend 30 seconds renaming files. This suggests template-based operation using pre-built fraud infrastructure, multiple deployments using identical asset libraries, speed prioritized over operational security, and possible automated deployment pipeline.

Component Analysis: Main Application (scam-site.js)

Overview

The primary application bundle is a 46,600+ line minified Vue.js 3.5.13 application with integrated image viewing capabilities and extensive DOM manipulation features.

Technical Stack

Critical Vulnerability: DOM-based XSS

CVSS Score: 8.6 (HIGH)

Attack Vector: Network / Attack Complexity: Low

Impact: Complete compromise of client-side application security

The application contains a critical DOM-based Cross-Site Scripting (XSS) vulnerability in its SVG and MathML rendering logic:

// Vulnerable sanitization logic zm = xl ? (e) => xl.createHTML(e) : (e) => e // Passthrough when Trusted Types unavailable // Dangerous sink with unsanitized input wd.innerHTML = zm( i === 'svg' ? `${e}` : i === 'mathml' ? `${e}` : e )

Exploitation Vectors:

Potential Impact: An attacker could deface the site, redirect victims to warning pages, exfiltrate scammer data, or completely disrupt operations.

Component Analysis: PK Voting System

The PK (Player Knockout) voting system is the psychological engagement engine of the scam operation. This 260-line component implements sophisticated gamification mechanics designed to build sunk cost fallacy and maintain daily victim engagement.

Engagement Mechanics

// Multiple route detection patterns const isPkRoute = currentPath === '/pk' || currentPath === '/pk.html' || currentPath.endsWith('/pk') || currentPath.includes('/pk.html') || currentHash === '#/pk' || fullUrl.includes('/pk.html'); // Persistent monitoring - checks every second setInterval(checkRoute, 1000);

Psychological Manipulation Tactics

Tactic Implementation Psychological Effect
Persistent Monitoring Route checks every 1000ms Ensures engagement hook always active
Multiple Fallbacks 5 delayed checks: 1s, 2s, 3s, 5s Guarantees system loads regardless of timing
Forced Initialization forceInitVoteSystem() on failures Maintains engagement despite errors
Daily Ritual Creation Daily voting requirement Builds habitual behavior patterns
Points Accumulation Vote rewards tracked Creates sunk cost investment

Behavioral Analysis

Victim Engagement Flow

The JavaScript components work together to create a comprehensive victim engagement pipeline:

  1. Initial Hook: WhatsApp link → Landing page with Vue.js SPA
  2. Route Detection: pk-vote-integration.js detects /pk route every 1000ms
  3. System Initialization: 5 fallback attempts to ensure voting system loads
  4. Engagement Loop: Daily voting creates habitual behavior pattern
  5. Sunk Cost Building: Points accumulate, psychological investment increases
  6. Lottery Teasing: Lottery links generate excitement about 'winning'
  7. Link Interception: lucky-draw-links.js redirects to controlled workspace
  8. Qualification: High-engagement users identified as premium targets
  9. Token Push: Lottery 'requires' AEA token purchase or point spend
  10. Exit Scam: Once invested, victim funds extracted

Live Operational Evidence

The captured console logs demonstrate active deployment on November 13, 2025. Empty hash indicates victims receive direct links to engagement systems rather than relying on client-side routing discovery.

Threat Actor Profile

Skill Assessment

Capability Level Evidence
Social Engineering Advanced Sophisticated gamification, psychological manipulation
Web Development Intermediate Vue.js framework, modern JS patterns
Security Practices Novice XSS vulnerabilities, ALL production debug logs
Operational Security Abysmal Chinese comments, stock photo filenames, API exposure
Infrastructure Management Intermediate Multiple domains, CDN usage, rapid re-deployment

Attribution Indicators

Operational Characteristics

The threat actors demonstrate persistence through immediate domain re-registration, professional front-end with investment in UI/UX, but amateur back-end security with zero OPSEC discipline. Debug logs, filenames, and API exposure all in production. Copy-paste development with framework boilerplate and minimal customization suggests template operation with identical asset filenames indicating multi-deployment template.

Indicators of Compromise

JavaScript Fingerprints

Network Indicators

Behavioral Indicators

Asset Fingerprints

Unmodified stock photography filenames provide infrastructure signature for content filtering, identifying related scam infrastructure, reverse image search, and file size/dimension fingerprinting for automated detection.

Recommendations

For Law Enforcement

For Security Researchers

For Hosting Providers

For Potential Victims

WARNING SIGNS

If you encounter a website with:

  • Daily voting or "PK" competition systems
  • Points accumulation for daily tasks
  • Lottery systems requiring participation
  • Promises of cryptocurrency token allocation
  • Professional appearance with unsolicited WhatsApp contact
  • Console shows "PK Integration" or "LuckyDrawLinks" debug messages

DO NOT ENGAGE. This matches the Clyra Capital fraud pattern.

How to Check:

Open browser developer tools (F12) and look at the Console tab. If you see messages like "PK Integration - Route Check" or "LuckyDrawLinks - Initializing", you are on a scam site.

Conclusion

The Clyra Capital fraud infrastructure represents a fascinating case study in operational security failure. The threat actors have created sophisticated psychological manipulation systems with advanced gamification mechanics, yet simultaneously deployed with such catastrophically poor operational security that they've essentially provided defenders with a complete intelligence package.

Key Takeaways

Comprehensive Intelligence Leakage

The scammers have essentially published their own technical documentation through:

Operational Assessment

This is not a sophisticated cybercrime operation — this is a social engineering operation built by people who Googled "Vue.js tutorial" and forgot to disable development mode before deployment. The combination of advanced psychological manipulation tactics, professional-looking Vue.js frontend, zero production hardening, verbose debug logging in live environment, exposed API structure, unchanged stock photo filenames, and Chinese test comments in production code suggests an operation focused on speed and volume rather than operational longevity.

Recommended Immediate Actions

CRITICAL — Time-Sensitive Actions

  1. Hosting Provider Notification: Hostinger (current host) with evidence package; GoDaddy (registrar) with abuse complaint
  2. Additional Domain Monitoring: Watch for new registrations with Vue.js 3.5.13 + viewer.js combination, stock photo filename patterns, console log signatures, and API endpoint structure
  3. Victim Warning System: Leverage XSS vulnerability to inject warnings, monitor console logs to identify active victims, track lottery link click patterns
  4. Law Enforcement Coordination: Canadian Anti-Fraud Centre (victim location), Singapore authorities (infrastructure location), international coordination for takedown
  5. Intelligence Sharing: Share indicators with hosting providers, publish console log signatures, distribute stock photo filename patterns, alert cryptocurrency exchanges about AEA token scam

Document Metadata

Primary Analyst: SecureLeaf Cybersecurity Division (Dispensight)
Analysis Duration: 6 hours
Evidence Sources: Static code analysis (4 JavaScript files), Live console capture (November 13, 2025), Network traffic analysis, Asset enumeration, API endpoint discovery
Intelligence Classification: PUBLIC — Please share freely to protect potential victims
Report Identifier: ADV-2025-JS-7K9M4N6P8Q2R
Contact: SecureLeaf Cybersecurity Division
Email: security@dispensight.com
Web: secureleaf.dispensight.com

Recommended Distribution

  • Post on social media to warn potential victims
  • Share with cryptocurrency communities
  • Forward to friends/family who discuss crypto investments
  • Provide to financial institutions and fraud prevention teams
  • Submit to anti-scam databases and registries
Public License: This report may be freely distributed, quoted, and shared without modification for fraud prevention purposes.