otx.alienvault.com
Open in
urlscan Pro
13.224.193.120
Public Scan
URL:
https://otx.alienvault.com/pulse/613f5dc1c1c8aa2b896a009c/edit?utm_userid=swimlanecyou&utm_content=email&utm_campaign=new_p...
Submission: On September 13 via api from US — Scanned from DE
Submission: On September 13 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
× On Friday, September 10th, 2021 at 5pm US/Central time, OTX will be undergoing an internal migration. It is not expected that there will be any downtime, but all such migrations come with some risk. If you see any unexpected behavior, please report it to otx-support@alienvault.com. Screenshots and error messages, if available, would be very useful to diagnose problems. * Browse * Scan Endpoints * Create Pulse * Submit Sample * API Integration * Login | Sign Up All * Login | Sign Up * Share Actions Subscribers (157516) Suggest Edit Clone Embed Download Report Spam JAVASCRIPT-BASED PHISHING * Created 38 minutes ago by AlienVault * Public * TLP: White Many traditional phishing detection systems rely on the presence of login forms within the HTML of the webpage to classify pages as phishing. Client-side cloaking is an increasingly common technique that attackers use to evade phishing detection systems by requiring complex user interaction before revealing the webpage’s phishing content, or by using JavaScript to inject phishing content into the page only after the page renders in the user’s browser. Reference: https://unit42.paloaltonetworks.com/javascript-based-phishing/ Tags: javascript, phishing, Client-Side Cloaking Att&ck IDs: T1055 - Process Injection , T1027 - Obfuscated Files or Information , T1087 - Account Discovery , T1574 - Hijack Execution Flow , T1566 - Phishing , T1059.007 - JavaScript * Indicators of Compromise (7) * Related Pulses (1) * Comments (0) * History () COMMENTS You must be logged in to leave a comment. Refresh Comments * © Copyright 2021 AlienVault, Inc. * Legal * Status