The Latest in IT Security

Posts Tagged ‘Obfuscation’

I found a malicious page placed on a hacked server: CRA stands for Canada Revenue Agency, as you can see in the page’s source code below: The meta tag redirects to the Canada Revenue Agency’s website after a few seconds: But what is the rest of the obfuscated code? Here is the deobfuscated version (courtesy […]

Read more ...

09
Jun
2011

A few days ago, I blogged about a PHP/JS malware targeting the osCommerce platform, which used an interesting new technique to obfuscate the malicious code. It so happens, that today I came across even more advanced sample of a PHP infector, also in the context of a vulnerable e-commerce solution. When I came to work […]

Read more ...

A few weeks ago, the Phoenix Exploit Kit 2.5 source code was leaked. At the time, it was not really useable, as it required activating by the author of the exploit kit. It contains an activation page that is being used to load all the exploits to the server for every specific customer. As expected, […]

Read more ...


Categories

TUESDAY, APRIL 22, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments