![]() ![]() ![]() ![]() Obfuscation falls into several categories. Machines can still run it without problems, but it's hard for them to analyze it. In other words, the distributor performs various changes on the code to make it hard for both humans and machines to understand. For this reason, malicious JavaScript is usually obfuscated. If a function plainly connects to a known criminal site, anti-malware software won't have a hard time catching it. Malware distributors try to disguise their intentions. An infection which hits a popular site can affect a large number of clients in a short time. It engages in tricks to make users accept something which they shouldn't. It takes advantage of browser bugs, especially in browsers that haven't been updated recently. The use of JavaScript malware has grown steadily over the years, with about 50 million incidents estimated for 2018 and 32,740 web pages with malicious JavaScript detected by our public web scanners last month. ![]()
0 Comments
Leave a Reply. |