What is this code in each pages source?
What is this code in each pages source?
Other urls found in this thread:
bitcoin miner/RAT/ransomware payload
if you're seeing the code, you're already infected.
the wrath of hirohito nagasaki
whatever it is, it's not Sup Forums's problem
go and kill yourself, faggot.
this is why net neutrality should be taken away
Nice try hiro
shh
An actual answer, from someone in the industry.
We don't know, but we know we have to use it otherwise JavaScript is broken.
Things always break or don't work properly when we don't include it.
Javascript Web Design Engineer here,
you're bang on the money.
This script is usually automatically embedded into pages by WYSIWYG programs such as Dreamweaver and Muse and it seems to enable features in JS that allow faster and more advanced usage. Some features don't work without it.
Best thing to do is link it in your webpages whenever you make one - since the JavaScript devs want you to include it.
Nonfree javascript
why can't i post
Is this a good solution?
top kek
reminds me of that dude who quit at microsoft and ranted about how fucking brocken its source is
That's an obfuscated bitcoin minder and these 2 faggots here: are shills.
Full story:
deobfuscated some vars manually:
y = 'p'; w = '.'; z = '0'; x = 'd'; k = 'o'; C = 'z'; A = 'n'; G = '_'; S = 'h'; U = 'w'; B = 'S'; D = '>'; E = '/'; F = 'rf'; H = 'kz'; I = 'xk'; J = 'zx'; K = 'pw'; L = 'nn'; M = 'pr'; N = 'z'; O = 'ur'; P = 'sb'; Q = 'fc'; R = 'hs'; T = 'com'; V = 'net'; W = 'enc'; X = 'src'; Y = 'IMG'; Z = 'org'; $ = 'GET'; _ = 'dec'; ff = 'pow'; nf = '
This board is a malware infected joke
cont.
$n = 'Request'; _n = 'add'; fu = 'Event'; nu = 'Listener'; uu = 'Mutation'; ru = 'Observer'; tu = 'var'; ou = ' '; iu = 'a'; vu = '\'; au = '['; cu = '('; pu = '.'; su = '+'; eu = ')'; bu = ']'; du = ';'; hu = 'get'; ju = 'Elements'; lu = 'By'; mu = 'Tag'; qu = 'Name'; gu = ''; yu = 'S>'; wu = '//'; zu = '/z'; xu = '
interesting
the script is responsible for connecting to those 3 new domains, right?
Do you think there is more than that going on, from what you got so far?
???
has nothing to do with nn
>manually
You could have done it in 2 seconds by just evaluating them
pastebin.com
The array of strings like "qspupuzqf" could it be subdomains?
the process is slow...
well, by manually I mean, modifying the code. yes, I did evaluate them...
Remember me again, why did Sup Forumseddit cheer when moot sold this place to this slant eyed rat?
Fuck me I miss him so much.
Someone dumped a bunch of snippets on lainchan yesterday
lainchan org/Ω/res/6578.html
What's the server?
sorry guys, the code is a mess, I'm not going to waste more time on this.
It's jQuery you FR**KING IDIOTS
>mfw retards don't know js can't just escape a browser sandbox and become ransomware
why do crossboarders come here to shitfling
>argon_enable
>retard calling other people retards
gtfo of Sup Forums
t. Sup Forumsermin windows pro
What server is that?
dumbass, people are talking about shitcoin miners. that shit doesn't need to escape the browser sandbox, it just needs to use your cou/gpu
people have been claiming it's a crypto miner, ransomware, anything and everything except what it actually is: a fucking antiadblock script. there is ZERO evidence of it being a crypto miner.
>a fucking antiadblock script
prove it.
>there is ZERO evidence of it being a crypto miner.
there is ZERO evidence of it being a fucking antiadblock script
Watch this YouTube video I just found in pic related. It's about hiroyiki selling user data of 2chan and how he established some kinda business deal with a US based company that sells user data called Foursquare 5 days before he bought Sup Forums from moot. So it's obvious hiroyiki isn't making money off of Sup Forums just like moot wasn't. So why did he want it ? To sell our data like he did with 2chan ?
the deobfuscated code very clearly shows that it kills CSS when it cannot connect to the three new domains. nowhere does it say anything related to shitcoin mining.
OK, good. now, you should know, ads CAN INSTALL MALWARE in your system, by exploiting vulnerabilities in your browsers, its addons, etc.
>random shitcode burning a 0day for this
okay kid
Does Sup Forums have its own Discord? Because I have one sitting here that I might share.
And that fucking Jap wondered why his ancestors were bombed and blown to smithereens. Act like a fuck, get fucked.
Don't know, I got the image from pol.
If it's like any other obfuscated piece of JS malware I've encountered, what's being obfuscated is a series of requests to other sites that have the actual malware on them, there are multiple ones to ensure that the malware gets delivered in case other sites get taken down. This probably isn't a coinminer, but it could have the victim grab it somewhere else.
Someone who wanted to see what this really does should probably spin up a burner laptop or something (not a VM) and debug the JS execution while capturing packets with Wireshark.
nice
I mean it's absolutely non-trivial, but it's not impossible either. Sandbox escape is an actively researched class of exploit. The better argument is that nobody is throwing away a 0-day on such an extremely blatant, amateur hour and small scale operation as this.
And there would be evidence if they were.