generic_javascript_obfuscation in faultycanvas.com

On 2019-11-27T04:30:08.388521+00:00 we found suspicious pattern generic_javascript_obfuscation, type: Suspicious, (JavaScript obfuscation is frequently used to hide malicious code (or with hope to protect intellectual property)) in the page https://faultycanvas.com/v2/0/zkkCzJ8x7…

The suspicious code sample:

b'atob' … b'atob' … b'atob' … b'atob' … b'"dangerouslySetInnerHTML"' … b'"getBoundingClientRect"' … b'"getBoundingClientRect"' … b'"getElementsByClassName"' … b'"formatImpressionCount"' … b'"InvalidCharacterError"' … b'"triggerMeasureDetectedEvent"'

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!