generic_javascript_obfuscation in www.gstatic.com

On 2019-12-10T15:30:15.139948+00:00 we found pattern generic_javascript_obfuscation, type: Suspicious, (JavaScript obfuscation is frequently used to hide malicious code (or with hope to protect intellectual property)) in the page https://www.gstatic.com/firebasejs/3.... referenced from https://nakeddream.pro/landers/25cd3f... .

Code sample:

b'atob' … b'"getOobConfirmationCode"' … b'"getOobConfirmationCode"' … b'"1234567890abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ"' … b'"createUserWithEmailAndPassword"' … b'"fetchProvidersForEmail"' … b'"sendPasswordResetEmail"' … b'"signInWithCustomToken"' … b'"signInWithEmailAndPassword"' … b'"verifyPasswordResetCode"' … b'"sendEmailVerification"' … b'"customOAuthParameters"' … b'"customOAuthParameters"' … b'"customOAuthParameters"' … b'"customOAuthParameters"' … b'"pushsubscriptionchange"' … b'"setMaxUploadRetryTime"' … b'"maxOperationRetryTime"' … b'%25'

This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).

Fully automated RESTful API is now available. Subscribe for your free trial today!