generic_javascript_obfuscation in www.tocontent.net

On 2019-10-04T20:43:05.614698+00:00 we found suspicious pattern generic_javascript_obfuscation, type: Suspicious, (JavaScript obfuscation is frequently used to hide malicious code (or with hope to protect intellectual property)) in the page https://www.tocontent.net/zY7fYn-pDUpUU…

The suspicious code sample:

b'atob' … b'atob' … b'atob' … b'"addQualityOptionsToForm"' … b'"addFingerprintStatusToForm"' … b'"setFingerprintIfNeeded"' … b'"HasBeenSetPreviously"' … b'"Fingerprint2JSWasGenerated"' … b'"ErrorOccurredInFingerprint2JS"' … b'"webglVendorAndRenderer"' … b'"V2ViS2l0MutationObserver"' … b'"WW91IGNhbm5vdCByZXNvbHZlIGEgcHJvbWlzZSB3aXRoIGl0self"' … b'"reverseZoneIdEncoded"'

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!