generic_javascript_obfuscation in polyfill.io

On 2019-05-02T16:29:11.009637+00:00 we found pattern generic_javascript_obfuscation, type: Suspicious, (JavaScript obfuscation is frequently used to hide malicious code (or with hope to protect intellectual property)) in the page https://polyfill.io/v3/polyfill.min.js referenced from https://www.zooplus.es/ .

Code sample:

b'\\x09' … b'\\x0A' … b'\\x0B' … b'\\x20' … b'\\xA0' … b'\\x09' … b'\\x0A' … b'\\x0B' … b'\\x20' … b'\\xA0' … b'atob' … b'atob' … b'atob' … b'atob' … b'"InvalidCharacterError"' … b'"InvalidCharacterError"' … b'"requestAnimationFrame"' … b'"webkitRequestAnimationFrame"' … b'"RequestAnimationFrame"' … b'"getOwnPropertySymbols"' … b'"CustomEventConstructor"'

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!