generic_javascript_obfuscation in www.queertoqueer.it

On 2020-01-15T11:48:05.425004+00:00 we found pattern generic_javascript_obfuscation, type: Suspicious, (JavaScript obfuscation is frequently used to hide malicious code (or with hope to protect intellectual property)) in the page https://www.queertoqueer.it/wp-conten... referenced from https://www.queertoqueer.it/ .

Code sample:

b'atob' … b'"elementor/frontend/init"' … b'"onElementorFrontendInit"' … b'"setCloseButtonPosition"' … b'"removeBackgroundLayer"' … b'"updateBackgroundLayerSize"' … b'"defineBackgroundLayerDimensions"' … b'"initInteractionsTypes"' … b'"prepareSpecialActions"' … b'"getMovePointFromPassedPercents"' … b'"getEffectValueFromMovePoint"' … b'"getDirectionMovePoint"' … b'"appendAnimationClasses"' … b'"galleriesNavigationListener"' … b'"setLightboxGalleryIndex"' … b'"handleNoHeadingsFound"' … b'"slideChangeTransitionStart"'

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!