Clyra Capital Fraud Infrastructure
JavaScript Component Analysis (Enhanced)
⚠️ WARNING - PUBLIC ADVISORY
This report is released publicly to protect potential victims from the Clyra Capital cryptocurrency investment fraud. Please share freely with anyone who may be targeted by cryptocurrency investment scams.
Advisory ID
ADV-2025-002-JS-ENHANCED
Report Identifier
ADV-2025-JS-7K9M4N6P8Q2R
Analysis Date
November 13, 2025
Classification
PUBLIC
Target Infrastructure
clyracapital.vip (Active)
Related Domains
clyracapital.com (Neutralized)
Executive Summary
This document provides a comprehensive technical analysis of the JavaScript infrastructure deployed by the Clyra Capital cryptocurrency investment fraud operation, enhanced with live console capture data and API endpoint discovery. The analysis covers four primary JavaScript components discovered on the alternate domain clyracapital.vip, registered November 13, 2025, immediately following the neutralization of their primary domain.
This infrastructure demonstrates sophisticated social engineering combined with catastrophically amateur security practices. Threat actors show persistence (immediate domain re-registration) but lack even basic operational security discipline. Production deployment includes verbose debug logging, exposed API structure, and unchanged stock imagery filenames creating a comprehensive operational intelligence goldmine for defenders.
Infrastructure Overview
Component Architecture
The Clyra Capital scam infrastructure consists of four primary JavaScript components working in concert to create a comprehensive victim engagement and manipulation system. Each component serves a specific role in the overall scam operation:
Component
File
Primary Function
Lines of Code
Main Application
scam-site.js
Vue.js 3.5.13 frontend framework
46,600+
Configuration
config.js
API endpoint configuration (obfuscated)
12
Voting System
pk-vote-integration.js
Gamification and engagement tracking
260
Lottery System
lucky-draw-links.js
Link manipulation and user tracking
140
Operational Security Failures
1. Production Debug Logging (CRITICAL OPSEC FAILURE)
Live console capture reveals the scammers deployed with ALL debug logging enabled, providing real-time operational intelligence to anyone with browser developer tools:
Impact: This leaks exact system initialization sequence, link manipulation mechanics in real-time, route detection patterns, complete operational workflow, and error conditions with retry logic.
Impact: Complete API structure mapped without penetration testing, endpoint functionality clearly labeled, no authentication obfuscation visible, and direct testing targets identified.
3. Unmodified Stock Photo Filenames
The site uses completely unmodified stock photography with descriptive original filenames:
Dimension preservation (3210x2140) indicates no post-processing
No attempt to obscure asset origins
Psychological Implication: Threat actors invested in sophisticated Vue.js frontend development but couldn't spend 30 seconds renaming files. This suggests template-based operation using pre-built fraud infrastructure, multiple deployments using identical asset libraries, speed prioritized over operational security, and possible automated deployment pipeline.
Component Analysis: Main Application (scam-site.js)
Overview
The primary application bundle is a 46,600+ line minified Vue.js 3.5.13 application with integrated image viewing capabilities and extensive DOM manipulation features.
Technical Stack
Framework: Vue.js 3.5.13 (latest at time of deployment)
Build Tool: Vite (confirmed via console output and asset hashing)
Image Viewer: Viewer.js integration with custom directives
State Management: Vue 3 Composition API with reactive refs
Routing: Client-side routing with history API manipulation
Critical Vulnerability: DOM-based XSS
CVSS Score: 8.6 (HIGH)
Attack Vector: Network / Attack Complexity: Low
Impact: Complete compromise of client-side application security
The application contains a critical DOM-based Cross-Site Scripting (XSS) vulnerability in its SVG and MathML rendering logic:
// Vulnerable sanitization logic
zm = xl ? (e) => xl.createHTML(e) : (e) => e // Passthrough when Trusted Types unavailable
// Dangerous sink with unsanitized input
wd.innerHTML = zm(
i === 'svg' ? `` :
i === 'mathml' ? `` :
e
)
Potential Impact: An attacker could deface the site, redirect victims to warning pages, exfiltrate scammer data, or completely disrupt operations.
Component Analysis: PK Voting System
The PK (Player Knockout) voting system is the psychological engagement engine of the scam operation. This 260-line component implements sophisticated gamification mechanics designed to build sunk cost fallacy and maintain daily victim engagement.
Lottery Teasing: Lottery links generate excitement about 'winning'
Link Interception: lucky-draw-links.js redirects to controlled workspace
Qualification: High-engagement users identified as premium targets
Token Push: Lottery 'requires' AEA token purchase or point spend
Exit Scam: Once invested, victim funds extracted
Live Operational Evidence
The captured console logs demonstrate active deployment on November 13, 2025. Empty hash indicates victims receive direct links to engagement systems rather than relying on client-side routing discovery.
Chinese comments, stock photo filenames, API exposure
Infrastructure Management
Intermediate
Multiple domains, CDN usage, rapid re-deployment
Attribution Indicators
Language: Chinese comments ('jiekou qingqiu dizhi', 'ceshi') in production code
Framework Choice: Vue.js heavily favored in Chinese development community
Time Zone: Domain registration and deployment timing suggests Asia/Pacific operation
Infrastructure: Singapore registrar (Gname), Cloudflare CDN common in Asia
Methodology: 'Pig butchering' ('sha zhu pan') scam pattern with Chinese origins
Testing Notes: 'ceshi' (test) in comments suggests development-to-production migration
Operational Characteristics
The threat actors demonstrate persistence through immediate domain re-registration, professional front-end with investment in UI/UX, but amateur back-end security with zero OPSEC discipline. Debug logs, filenames, and API exposure all in production. Copy-paste development with framework boilerplate and minimal customization suggests template operation with identical asset filenames indicating multi-deployment template.
Indicators of Compromise
JavaScript Fingerprints
Vue.js Version: Exact version 3.5.13 identifiable in minified code
Viewer.js Integration: Image viewer library with custom directive 'v-viewer'
Global Variables: window.globalSetting, window.voteSystemInstance, window.luckyDrawLinksInstance
Console Strings: 'PK Integration -', 'LuckyDrawLinks -' prefixes in all debug logs
Console Verbosity: Continuous debug output on every system action
Asset Fingerprints
Unmodified stock photography filenames provide infrastructure signature for content filtering, identifying related scam infrastructure, reverse image search, and file size/dimension fingerprinting for automated detection.
Backend Identification: Monitor network requests to identify actual API endpoints (now mapped)
User Tracking: WeakSet and console logs may reveal victim interaction patterns
Attribution: Chinese language comments support Asia-based threat actor hypothesis
Coordinated Takedown: Target all identified domains simultaneously to prevent migration
Template Identification: Use stock photo filenames to identify related infrastructure
For Security Researchers
XSS Exploitation: DOM-based XSS can be used for site defacement or victim warning
Console Monitoring: Debug logs provide real-time operational intelligence
API Testing: Complete endpoint structure now available for security assessment
Behavioral Analysis: Route polling and MutationObserver patterns fingerprintable
Infrastructure Mapping: Monitor for additional domain registrations with similar patterns
Asset Tracking: Monitor for identical stock photo filename patterns across domains
For Hosting Providers
Content Scanning: Scan for 'PK Integration' and 'LuckyDrawLinks' strings in JavaScript
Behavioral Detection: Alert on 1000ms interval setInterval() patterns in SPAs
Vue.js Version: Flag exact Vue.js 3.5.13 combined with lottery/voting systems
Asset Fingerprinting: Scan for exact stock photo filename patterns
Console Log Detection: Flag production deployments with extensive console.log() statements
For Potential Victims
WARNING SIGNS
If you encounter a website with:
Daily voting or "PK" competition systems
Points accumulation for daily tasks
Lottery systems requiring participation
Promises of cryptocurrency token allocation
Professional appearance with unsolicited WhatsApp contact
Console shows "PK Integration" or "LuckyDrawLinks" debug messages
DO NOT ENGAGE. This matches the Clyra Capital fraud pattern.
How to Check:
Open browser developer tools (F12) and look at the Console tab. If you see messages like "PK Integration - Route Check" or "LuckyDrawLinks - Initializing", you are on a scam site.
Conclusion
The Clyra Capital fraud infrastructure represents a fascinating case study in operational security failure. The threat actors have created sophisticated psychological manipulation systems with advanced gamification mechanics, yet simultaneously deployed with such catastrophically poor operational security that they've essentially provided defenders with a complete intelligence package.
Key Takeaways
Threat actors show persistence through immediate domain re-registration
Social engineering sophistication far exceeds technical security capability
Production debug logging provides extensive operational intelligence
Complete API structure exposed without any obfuscation
Chinese language comments supporting attribution analysis
Live console capture confirming November 13, 2025 deployment
XSS vulnerability enabling direct operational disruption
Real-time link replacement logged with full before/after URLs
Operational Assessment
This is not a sophisticated cybercrime operation — this is a social engineering operation built by people who Googled "Vue.js tutorial" and forgot to disable development mode before deployment. The combination of advanced psychological manipulation tactics, professional-looking Vue.js frontend, zero production hardening, verbose debug logging in live environment, exposed API structure, unchanged stock photo filenames, and Chinese test comments in production code suggests an operation focused on speed and volume rather than operational longevity.
Recommended Immediate Actions
CRITICAL — Time-Sensitive Actions
Hosting Provider Notification: Hostinger (current host) with evidence package; GoDaddy (registrar) with abuse complaint
Additional Domain Monitoring: Watch for new registrations with Vue.js 3.5.13 + viewer.js combination, stock photo filename patterns, console log signatures, and API endpoint structure
Victim Warning System: Leverage XSS vulnerability to inject warnings, monitor console logs to identify active victims, track lottery link click patterns
Law Enforcement Coordination: Canadian Anti-Fraud Centre (victim location), Singapore authorities (infrastructure location), international coordination for takedown