JS/Crypt.BBDF!tr
Analysis
This detection is for encrypted JavaScript malware that redirects the infected user's web browser to an unexpected site. Example behaviors include:
- Redirecting the web browser to navigate to http://laco{Removed}.com/cool/{Removed} when certain conditions on the user's browsing session are met.
- Injecting hidden IFrame tags to a web page from another source depending on conditions on the user's browsing session.
Recommended Action
- FortiGate Systems
- Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option.
FortiClient Systems
- Quarantine/delete files that are detected and replace infected files with clean backup copies.
Telemetry
Detection Availability
FortiGate | |
---|---|
Extended | |
FortiClient | |
FortiMail | |
FortiSandbox | |
FortiWeb | |
Web Application Firewall | |
FortiIsolator | |
FortiDeceptor | |
FortiEDR |