JavaScript Obfuscation Moves to Phishing Emails

  /     /     /  
Publicated : 23/11/2024   Category : security


JavaScript Obfuscation Moves to Phishing Emails


Attackers are hiding malicious payloads in phishing emails via a technique traditionally used to hide malicious code planted on websites.



JavaScript, the ubiquitous scripting language used across Web applications worldwide, is becoming a key ingredient in phishing campaigns looking to plant malicious code on victims computers, new research shows.
Phishing attacks using JavaScript obfuscation techniques rose more than 70% from November 2019 through August 2020, according to Akamai lead researcher Or Katz.
Katz says that the reason for the rise in this attack technique is simple. The fact that JavaScript is a scripting language that runs on the client side gives [attackers] the ability to create content, but only once that content is rendered on the browser of the potential victims, will the actual page be rendered and be presented to the victim, Katz says. Only at that point in time will you see the actual phishing website asking for credentials or other personal information.
In the 
first of a series
 of blog posts on his research, he said content escaping, while not a sophisticated obfuscation technique, is effective at hiding - or obfuscating - the malicious content of a message. It is also far more commonly used on malicious websites than in phishing or scam email messages. Its the techniques growing use in email that caught Katzs attention.
JavaScript has been used in fairly simple obfuscation techniques, but the obfuscation is becoming more sophisticated, he found. Take XOR decryption, which hes seeing in more and more campaigns. XOR (exclusive-or) is a technique taken from cryptography that makes contents smaller while creating a block of text that is unique for each message. The result is something that cant easily be defeated by simple signature-matching anti-malware techniques.
Katz then took a closer look a specific campaigns using the JavaScript obfuscation techniques. He notes In the 
second blog post
 that single malicious email messages are now carrying JavaScript code that uses multiple obfuscation and re-direction techniques, including URL cloaking, content escaping, and polymorphic functions at the same time. These techniques are just the tip of the iceberg, as more complex techniques, including huge chunks of embedded dead code and anti-debugging, are constantly being used in the wild, he said in the post.
He told Dark Reading he believes JavaScript obfuscation
will increase
in email phishing attacks.
There is a movement from using solely emails as a way to propagate phishing scams into social networks and messaging and social messaging platforms to deliver a lot of those scams, he says. When you try to distribute attacks through of social media, then you are actually using the power of that platform to do a very rapid kind of distribution that is dependent on the trustworthiness of the people that are distributing them.
Because the techniques are being so successful, Katz says that theyre not limited to a single criminal organization or geographic area: theyre being used worldwide by a wide variety of threat actors. And because they can come from so many sources, and hide in so many ways, Katz says that basic user education may still be one of the most powerful tools to use against them.
It starts, he says, with reminding users that an email message that seems too good to be true probably is. And if the URL seems unusual, or appears from an unusual location in a message or on a Web page, that should be a red flag.
Stop at that point, think twice and try to figure out if you need to give any personal information. If its suspicious enough to make you think, he says, then its almost certainly suspicious enough to make you stop.

Last News

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
JavaScript Obfuscation Moves to Phishing Emails