generic_javascript_obfuscation in caniuse.com

On 2019-07-09T20:03:56.061014+00:00 we found suspicious pattern generic_javascript_obfuscation, type: Suspicious, (JavaScript obfuscation is frequently used to hide malicious code (or with hope to protect intellectual property)) in the page http://caniuse.com/

The suspicious code sample:

b'atob' … b'"application/opensearchdescription+xml"' … b"'GoogleAnalyticsObject'" … b'"registerprotocolhandler"' … b'"getelementsbyclassname"' … b'"contentsecuritypolicy"' … b'"contentsecuritypolicy2"' … b'"stricttransportsecurity"' … b'"upgradeinsecurerequests"' … b'"comparedocumentposition"' … b'"getboundingclientrect"' … b'"requestanimationframe"' … b'"scrollintoviewifneeded"'

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!