generic_javascript_obfuscation in a.postrelease.com

On 2018-09-11T04:59:58.466565+00:00 we found suspicious pattern generic_javascript_obfuscation, type: Suspicious, (JavaScript obfuscation is frequently used to hide malicious code (or with hope to protect intellectual property)) in the page https://a.postrelease.com/serve/load.js… referenced from http://www.cnn.com/ .

The suspicious code sample:

b'var g=eval;'

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!