<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5HLVVHN" height="0" width="0" style="display:none;visibility:hidden">
Tag: obfuscation

Malware Obfuscation using plain HTML: 7 Examples

html

Hackers will use any method they can to infect your server.

Just because a web site is using plain HTML, doesn’t mean it’s safer than one built on PHP. In this article are seven common examples of obfuscated malware and their de-obfuscated equivalents. To complement my article on PHP malware obfuscation, this article will look at obfuscation using plain HTML and JavaScript.

PHP malware obfuscation using goto

b2ap3_large_goto-malware

Imunify’s Malware Intelligence Team has been witnessing an increase in malware samples using the goto programming construct. Here’s a chart showing the recent surge of malware using goto as an obfuscating mechanism.

File System Friend or Foe? - How to Tell if a File is Malicious or Not

b2ap3_large_20190405164234_bad-file

An unlucky upshot of running your own website or online store is that, sooner or later, hackers will add it to their ‘juicy list of prey’. Once in their list, hackers will continuously scan and probe your site for weaknesses, trying to find a way to further their illicit goals.

Subscribe to Imunify security Newsletter