Site icon TheCyberThrone

Java Script Under Serious Obfuscation

Advertisements

A new study of over 10,000 malicious JavaScript samples, over 25% of the samples analyzed use JavaScript obfuscation methods to prevent detection and analysis.

Obfuscation is a powerful technique used by hackers and security teams all over the world. Both parties use it for different reasons, but their goal is the same: to make the source code indecipherable, hard to understand, and interpret and bypasses Security solutions easily

Frequent obfuscation methods include:

Akamai technologies have examined more than 10.000 malicious JavaScript samples including malware droppers, phishing pages, scammers, and cryptominers’ malware. More than 25% of the analyzed samples employ JavaScript obfuscation methods to avoid exposure. Since bundled by same packers their code seems to be similar and functions are different.

Research that will be presented at the SecTor 2021 conference introduces a technique that profiles the unique functionality of packers to detect JavaScript prior to it being obfuscated, regardless of the original code. That way, any JavaScript code that represents a threat like phishing, malware droppers, or scammers will be detected based on the techniques the packer introduces.

According to the report, additional investigation reveals that the technique being used is the result of various legitimate scenarios, including:

This evidence makes the difficulties in identifying malicious JavaScript easier to understand, as obfuscation alone does not imply the existence of malicious code.To identify the obfuscation ML is required to distinguish the scripts.

Exit mobile version