- Published on
Chapo is Giving Away 3500 MZN
- Authors
- Name
- Jeffer Marcelino Sunde
Recently, I’ve come across messages circulating in WhatsApp groups claiming that Daniel Chapo is giving away 3500 MZN.
Identifying the Scam
It’s obvious this is a scam; there’s no way he would distribute money like that for numerous reasons. However, this article isn’t focused on politics but rather on what’s behind the website linked in those messages.
Investigating the Website
Curious, I opened the link on my computer. The site prompted me to send my information. When I attempted to click the Cancel button, it instead asked me to enter "1" to confirm sending my information. I questioned what information it wanted and decided against confirming.
To dig deeper, I used a tool called Httrack, which can download an entire website given its URL. After downloading, I explored the source code.
Examining the Source Code
The code was nothing out of the ordinary. It doesn’t collect any information, contain any viruses, or pose any threats. For instance, the part asking for confirmation to send my information reads:
var password = '1';
password = prompt('Governo: Cadastre-se agora para a oferta contínua de 3500MT, por favor pressione 1 para enviar suas informações agora', '1');
if (password != '1') {
location.href = 'https://chapo-presentes.de-hoje.com';
}
This simple code checks if you enter "1" If you do, it proceeds with rendering the website because it blocks the rendering as it is placed at the top of the HTML. Otherwise, it keeps asking you to enter "1"
Redirecting Users
The code also checks certain conditions. If true, it redirects users to another route:
if (typeof window.orientation == 'undefined' && screen.width >= 1000) {
window.location.href = 'go.php'; // redirects to https://chapo-presentes.de-hoje.com/go.php
}
What’s at this route? Absolutely nothing; it simply redirects you multiple times until you land on a random website—likely to monetize clicks and traffic.
Mobile Users
You might wonder what happens if you enter the site using a device with a smaller screen width, like a phone. In that case, the website loads and prompts you to enter your phone number. However, even if you submit it, nothing happens since the site doesn’t send this information anywhere; it merely requests it without purpose.
Once you fill in your details, you'll see a screen like this:
Each time you click the button "COMPARTILHAR", the progress bar increases. Upon reaching 100%, you’ll be redirected to https://shkiru.com/m7TLLx
, navigating through multiple sites until you land on a random one. These redirected sites don’t collect any data; they’re just advertising pages designed to earn money based on traffic.
So, rest assured, the website claiming that "Chapo is giving away 3500 MZN" isn’t malicious. It’s simply a basic site without the risk of hacking.
As for the owner, there’s a link to a Blogger profile in the source code:
<link rel="me" href="https://www.blogger.com/profile/13809910274301822692">
Unfortunately, it’s not a public profile.
In summary, this website does not collect personal information; its primary goal is to generate revenue through clicks. Additionally, the quality of the source code is quite poor, reflecting a lack of attention to detail.