
Summary
This detection rule focuses on identifying HTML smuggling techniques that utilize the `eval` and `atob` JavaScript functions. It recursively examines files and archives for malicious content. Specifically, the rule targets files with common HTML extensions (such as .html, .htm, .shtml, .dhtml) and various supported archive formats. The primary goal is to detect the nested use of `eval(atob(...))`, which can be indicative of malware or phishing schemes. By scanning through the strings in the files using regular expressions, the rule seeks to uncover any instances of this method being employed to obfuscate malicious code embedded within seemingly benign HTML files. The high severity indicates a significant risk associated with success in detection through this rule, particularly in preventing credential theft and malware dissemination.
Categories
- Web
- Endpoint
- Cloud
Data Sources
- File
- Application Log
- Network Traffic
Created: 2022-12-12