Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month

Posted on June 13, 2025June 13, 2025 By CWS

Jun 13, 2025Ravie LakshmananWeb Safety / Community Safety

Cybersecurity researchers are calling consideration to a “large-scale marketing campaign” that has been noticed compromising authentic web sites with malicious JavaScript injections.
Based on Palo Alto Networks Unit 42, these malicious injects are obfuscated utilizing JSFuck, which refers to an “esoteric and academic programming fashion” that makes use of solely a restricted set of characters to write down and execute code.
The cybersecurity firm has given the method an alternate identify JSFireTruck owing to the profanity concerned.
“A number of web sites have been recognized with injected malicious JavaScript that makes use of JSFireTruck obfuscation, which consists primarily of the symbols [, ], +, $, {, and },” safety researchers Hardik Shah, Brad Duncan, and Pranay Kumar Chhaparwal mentioned. “The code’s obfuscation hides its true goal, hindering evaluation.”

Additional evaluation has decided that the injected code is designed to test the web site referrer (“doc.referrer”), which identifies the tackle of the online web page from which a request originated.
Ought to the referrer be a search engine comparable to Google, Bing, DuckDuckGo, Yahoo!, or AOL, the JavaScript code redirects victims to malicious URLs that may ship malware, exploits, visitors monetization, and malvertising.

Unit 42 mentioned its telemetry uncovered 269,552 internet pages which were contaminated with JavaScript code utilizing the JSFireTruck method between March 26 and April 25, 2025. A spike within the marketing campaign was first recorded on April 12, when over 50,000 contaminated internet pages have been recorded in a single day.
“The marketing campaign’s scale and stealth pose a major menace,” the researchers mentioned. “The widespread nature of those infections suggests a coordinated effort to compromise authentic web sites as assault vectors for additional malicious actions.”
Say Good day to HelloTDS
The event comes as Gen Digital took the wraps off a classy Visitors Distribution Service (TDS) known as HelloTDS that is designed to conditionally redirect website guests to pretend CAPTCHA pages, tech assist scams, pretend browser updates, undesirable browser extensions, and cryptocurrency scams via remotely-hosted JavaScript code injected into the websites.

The first goal of the TDS is to behave as a gateway, figuring out the precise nature of content material to be delivered to the victims after fingerprinting their gadgets. If the person just isn’t deemed an acceptable goal, the sufferer is redirected to a benign internet web page.

“The marketing campaign entry factors are contaminated or in any other case attacker-controlled streaming web sites, file sharing providers, in addition to malvertising campaigns,” researchers Vojtěch Krejsa and Milan Špinka mentioned in a report printed this month.
“Victims are evaluated based mostly on geolocation, IP tackle, and browser fingerprinting; for instance, connections via VPNs or headless browsers are detected and rejected.”
A few of these assault chains have been discovered to serve bogus CAPTCHA pages that leverage the ClickFix technique to trick customers into operating malicious code and infecting their machines with a malware referred to as PEAKLIGHT (aka Emmenhtal Loader), which is understood to server info stealers like Lumma.

Central to the HelloTDS infrastructure is using .high, .store, and .com top-level domains which can be used to host the JavaScript code and set off the redirections following a multi-stage fingerprinting course of engineered to gather community and browser info.
“The HelloTDS infrastructure behind pretend CAPTCHA campaigns demonstrates how attackers proceed to refine their strategies to bypass conventional protections, evade detection, and selectively goal victims,” the researchers mentioned.
“By leveraging refined fingerprinting, dynamic area infrastructure, and deception ways (comparable to mimicking authentic web sites and serving benign content material to researchers) these campaigns obtain each stealth and scale.”

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Infected, JavaScript, JSFireTruck, Malware, Month, Websites

Post navigation

Previous Post: In Other News: Cloudflare Outage, Cracked.io Users Identified, Victoria’s Secret Cyberattack Cost
Next Post: Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Related Posts

INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure The Hacker News
OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities The Hacker News
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks The Hacker News
How to Detect Phishing Attacks Faster: Tycoon2FA Example The Hacker News
Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers The Hacker News
Why Non-Human Identity Management is the Next Cybersecurity Frontier The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
  • How to Create an Incident Response Playbook
  • China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure
  • New Smartwatch Wi-Fi Injection, Android Radio and Hacking Tools
  • Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
  • How to Create an Incident Response Playbook
  • China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure
  • New Smartwatch Wi-Fi Injection, Android Radio and Hacking Tools
  • Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News