otx.alienvault.com Open in urlscan Pro
13.224.193.120  Public Scan

URL: https://otx.alienvault.com/pulse/613f5dc1c1c8aa2b896a009c/edit?utm_userid=swimlanecyou&utm_content=email&utm_campaign=new_p...
Submission: On September 13 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

×

On Friday, September 10th, 2021 at 5pm US/Central time, OTX will be undergoing
an internal migration. It is not expected that there will be any downtime, but
all such migrations come with some risk. If you see any unexpected behavior,
please report it to otx-support@alienvault.com. Screenshots and error messages,
if available, would be very useful to diagnose problems.

   
 * Browse
 * Scan Endpoints
 * Create Pulse
 * Submit Sample
 * API Integration
   
   
 * Login | Sign Up
   

All
   
 * Login | Sign Up
   
 * 
   


Share
Actions
Subscribers (157516)
Suggest Edit
Clone
Embed
Download
Report Spam



JAVASCRIPT-BASED PHISHING

   
 * Created 38 minutes ago by AlienVault
 * Public
 * TLP: White

Many traditional phishing detection systems rely on the presence of login forms
within the HTML of the webpage to classify pages as phishing. Client-side
cloaking is an increasingly common technique that attackers use to evade
phishing detection systems by requiring complex user interaction before
revealing the webpage’s phishing content, or by using JavaScript to inject
phishing content into the page only after the page renders in the user’s
browser.

Reference:
https://unit42.paloaltonetworks.com/javascript-based-phishing/
Tags:
javascript, phishing, Client-Side Cloaking
Att&ck IDs:
T1055 - Process Injection , T1027 - Obfuscated Files or Information , T1087 -
Account Discovery , T1574 - Hijack Execution Flow , T1566 - Phishing , T1059.007
- JavaScript

 * Indicators of Compromise (7)
 * Related Pulses (1)
 * Comments (0)
 * History ()


COMMENTS

You must be logged in to leave a comment.

Refresh Comments

 * © Copyright 2021 AlienVault, Inc.
   
 * Legal
   
 * Status