
Summary
This rule is designed to detect HTML smuggling techniques by recursively scanning files and archives for specific indicators. It specifically looks for file types associated with HTML formats, such as .html, .htm, .shtml, and .dhtml, along with commonly used archive file extensions. The rule utilizes a sophisticated method of examining potentially malicious JavaScript identifiers, with a focus on certain keywords and methods known to be associated with HTML smuggling attacks. The identifiers searched in the rule include 'location', 'charCodeAt', 'fromCharCode', and 'indexOf', among others, which are commonly exploited in HTML-based attacks. The rule raises a high severity alert due to the potential risks associated with these techniques, which can be used for credential phishing and deploying malware or ransomware. The detection methods employed include archive analysis, content analysis, file analysis, JavaScript analysis, and HTML analysis, making this rule robust against various obfuscation strategies employed by attackers.
Categories
- Web
- Cloud
- Endpoint
- Application
Data Sources
- File
- Process
- Network Traffic
Created: 2022-05-11