{"id":49898,"date":"2016-05-27T10:56:31","date_gmt":"2016-05-27T17:56:31","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=49898"},"modified":"2024-02-19T22:16:49","modified_gmt":"2024-02-20T06:16:49","slug":"seeing-darkleech-obfuscation-quick-hack-iframes","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/","title":{"rendered":"Seeing Through Darkleech Obfuscation: a Quick Hack to Iframes"},"content":{"rendered":"<p><em>This blog post was written by Kalpesh Mantri.<\/em><\/p>\n<p>Darkleech is an Apache module on the dark web that distributes malware. This tool, which appeared in 2012, was first used to infect many Apache servers and later sites running Microsoft IIS. The campaign infecting IIS sites was named pseudo-Darkleech\u00a0because\u00a0it resembles the Apache infector module. (In this post, we will use the term\u00a0<em>Darkleech<\/em>\u00a0to refer to both Apache and IIS campaigns.)<\/p>\n<p style=\"text-align: left;\">In early 2012, Darkleech scripts redirected users and led them to Blackhole exploit kit pages. After the Blackhole kit disappeared in October 2013, Darkleech moved to Fiesta exploit kits. From mid-2015 to today, Darkleech scripts switched occasionally between Neutrino and Angler exploit kits to deliver ransomware. Darkleech mostly redirects to Angler landing pages. (A\u00a0detailed history of Darkleech can be found\u00a0<a href=\"http:\/\/researchcenter.paloaltonetworks.com\/2016\/03\/unit42-campaign-evolution-darkleech-to-pseudo-darkleech-and-beyond\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.)<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Finding Darkleech\u00a0<\/strong><\/p>\n<p>Since late 2015, Darkleech scripts have evolved drastically. They are now highly obfuscated, and we can&#8217;t\u00a0easily determine the URLs they\u00a0redirect to.<\/p>\n<p>In this post we offer a quick hack for security researchers to find iframes and redirecting URLs from these heavily obfuscated scripts, which are injected into web pages. We\u00a0will focus only on finding the iframe and URL; we will not discuss the\u00a0functionality of the scripts or how they\u00a0work.\u00a0This hack does not require any special security tools. Using only Notepad and a browser (Firefox in this\u00a0case), we can see the final iframe and its redirecting URL. This technique makes use of the browser&#8217;s \u201calert box\u201d (message box) feature.<\/p>\n<p><strong>Warning<\/strong>: Do not directly run these scripts on a machine. Use VirtualBox or another virtual machine instead. Also, take caution while making use of the URLs in these scripts. They are usually exploit kit landing pages, which if active exploit vulnerabilities in users\u2019 systems and download malware (mostly ransomware) to infect your system.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Find the sample<\/strong><\/p>\n<p>For our demonstration, we will use a\u00a0Darkleech sample we found on VirusTotal that has a\u00a0low detection rate.<\/p>\n<p style=\"text-align: center;\">SHA-256: <a href=\"https:\/\/www.virustotal.com\/en\/file\/7ea431ca9980d5f1d92fc105cd89bc897774bbe970db5a8a32dcd6e73ef400ae\/analysis\/\" target=\"_blank\" rel=\"noopener\">7ea431ca9980d5f1d92fc105cd89bc897774bbe970db5a8a32dcd6e73ef400ae<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-49910 size-full aligncenter\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_1.png\" alt=\"b1_1\" width=\"827\" height=\"364\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_1.png 827w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_1-300x132.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_1-768x338.png 768w\" sizes=\"auto, (max-width: 827px) 100vw, 827px\" \/><\/p>\n<p>This sample has a block of data between &lt;span&gt; tags. The data in this block is highly useful for\u00a0decoding the\u00a0final iframe. This data block is decoded using a\u00a0script that is present just below the &lt;span&gt; block. This heavily obfuscated script lies within the &lt;script&gt; block of the HTML page:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-49899 size-full aligncenter\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_2.png\" alt=\"b1_2\" width=\"1196\" height=\"932\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_2.png 1196w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_2-300x234.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_2-768x598.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_2-1024x798.png 1024w\" sizes=\"auto, (max-width: 1196px) 100vw, 1196px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Follow these steps<\/strong><\/p>\n<p>Near the\u00a0end of the script, you will find a function call with the\u00a0following format:<\/p>\n<ul>\n<li>Function_name(variable_name)();<\/li>\n<\/ul>\n<p>In the script, the function appears like this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-49900 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_3.png\" alt=\"b1_3\" width=\"850\" height=\"158\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_3.png 850w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_3-300x56.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_3-768x143.png 768w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/p>\n<p>The variable_name is always a variable used to concatenate the entire script.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>First step<\/strong><\/p>\n<p>Replace the function_name (in this case, fileUploadSetTimeout) with \u201calert\u201d and remove the function call (the parentheses).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-49901 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_4.png\" alt=\"b1_4\" width=\"864\" height=\"202\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_4.png 864w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_4-300x70.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_4-768x180.png 768w\" sizes=\"auto, (max-width: 864px) 100vw, 864px\" \/><\/p>\n<p>After saving the file and opening this page in a browser, you will see the concatenated script string from this obfuscated code. The script will be displayed in a pop-up alert box.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-49902 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_5.png\" alt=\"b1_5\" width=\"625\" height=\"407\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_5.png 625w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_5-300x195.png 300w\" sizes=\"auto, (max-width: 625px) 100vw, 625px\" \/><\/p>\n<p>Copy and clean up the script:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-49903 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_6.png\" alt=\"b1_6\" width=\"784\" height=\"74\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_6.png 784w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_6-300x28.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_6-768x72.png 768w\" sizes=\"auto, (max-width: 784px) 100vw, 784px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Second step<\/strong><\/p>\n<p>Append this discovered script to the current HTML sample page just below the first step. These scripts are designed to run only on Internet Explorer. So after appending the script, we need to tweak the script to make it run smoothly on Firefox (and other browsers). Change the\u00a0script thus:<\/p>\n<p>Modify the original statement at line 12 by changing the value of variable &#8220;i&#8221; to zero.<\/p>\n<p style=\"padding-left: 30px;\">Original statement: \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 i = (+[window.sidebar]) + (+[window.chrome]);<\/p>\n<p style=\"padding-left: 30px;\">Modified statement:\u00a0\u00a0\u00a0\u00a0\u00a0 i = 0;<\/p>\n<p>Also, remove the function call \u201c()\u201d and \u201c[]\u201d and modify the function call statement:<\/p>\n<p style=\"padding-left: 30px;\">Original statement: \u00a0 \u00a0 \u00a0 \u00a0[][c][c](String.fromCharCode.apply(null, a))();<\/p>\n<p style=\"padding-left: 30px;\">Modified statement: \u00a0\u00a0\u00a0\u00a0 temp = [c][c](String.fromCharCode.apply(null, a));<\/p>\n<p style=\"padding-left: 180px;\">\u00a0 \u00a0alert(temp);<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-49904 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_7.png\" alt=\"b1_7\" width=\"722\" height=\"206\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_7.png 722w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_7-300x86.png 300w\" sizes=\"auto, (max-width: 722px) 100vw, 722px\" \/><\/p>\n<p>Save this modified script into same sample. Running the sample again now gives us two alert pop-ups. The second pop-up outputs the concatenated script, which is itself a new deobfuscated script.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-49905 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_8.png\" alt=\"b1_8\" width=\"625\" height=\"407\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_8.png 625w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_8-300x195.png 300w\" sizes=\"auto, (max-width: 625px) 100vw, 625px\" \/><\/p>\n<p>Copy this script and clean it:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-49906 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_9.png\" alt=\"b1_9\" width=\"733\" height=\"475\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_9.png 733w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_9-300x194.png 300w\" sizes=\"auto, (max-width: 733px) 100vw, 733px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Third step<\/strong><\/p>\n<p>Similar to the second step, append this script to the sample just after the second step script. Again, we tweak the script, four times, to make it run in Firefox or other browsers.<\/p>\n<p>Modify the original statement at line 20 by replacing the value of variable \u201cArrayTry\u201d to zero.<\/p>\n<p style=\"padding-left: 30px;\">Original statement: \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 ArrayTry = (+[window.sidebar]) + (+[window.chrome]);<\/p>\n<p style=\"padding-left: 30px;\">Modified statement:\u00a0\u00a0\u00a0\u00a0\u00a0 ArrayTry = 0;<\/p>\n<p>Change the if statement on line 23 to make the condition true:<\/p>\n<p style=\"padding-left: 30px;\">Original statement: \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 if (navigator.userAgent.indexOf(pkcs11Typeof[throwImage]) &gt; ArrayTry) {<\/p>\n<p style=\"padding-left: 30px;\">Modified statement: \u00a0\u00a0\u00a0\u00a0 if (true) {<\/p>\n<p>Also change the if statement on line 28 to skip the condition:<\/p>\n<p style=\"padding-left: 30px;\">Original statement: \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 if (navigator.userAgent.indexOf(&#8220;MSIE 10&#8221;) &gt; ArrayTry) {<\/p>\n<p style=\"padding-left: 30px;\">Modified statement: \u00a0\u00a0\u00a0\u00a0 if (false) {<\/p>\n<p>Finally, remove the function call \u201c()\u201d and \u201c[]\u201d and modify the function call statement:<\/p>\n<p style=\"padding-left: 30px;\">Original statement: \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 [][&#8220;constructor&#8221;][&#8220;constructor&#8221;](setIntervalInfinity)();<\/p>\n<p style=\"padding-left: 30px;\">Modified statement: \u00a0\u00a0\u00a0\u00a0 tempA = [&#8220;constructor&#8221;][&#8220;constructor&#8221;](setIntervalInfinity);<\/p>\n<p style=\"padding-left: 180px;\">\u00a0 \u00a0alert(tempA);<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-49907 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_10.png\" alt=\"b1_10\" width=\"789\" height=\"787\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_10.png 789w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_10-150x150.png 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_10-300x300.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_10-768x766.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_10-32x32.png 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_10-64x64.png 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_10-96x96.png 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_10-128x128.png 128w\" sizes=\"auto, (max-width: 789px) 100vw, 789px\" \/><\/p>\n<p>Save this modified script into the same sample. Running the sample again now gives us three alert pop-ups. The first two are the\u00a0same as before. The third pop-up contains the final malicious iframe and URL that redirects the user.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-49923 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_11-1.png\" alt=\"b1_11\" width=\"584\" height=\"196\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_11-1.png 584w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_11-1-300x101.png 300w\" sizes=\"auto, (max-width: 584px) 100vw, 584px\" \/><\/p>\n<p>Copy and clean up\u00a0the script:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-49909 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_12.png\" alt=\"b1_12\" width=\"841\" height=\"267\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_12.png 841w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_12-300x95.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/b1_12-768x244.png 768w\" sizes=\"auto, (max-width: 841px) 100vw, 841px\" \/><\/p>\n<p>We can now easily see the document.write\u00a0function call with iframe and URL.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>With this simple\u00a0three-step hack, anyone can easily analyze any Darkleech-injected obfuscated scripts to find the redirecting URLs. With the\u00a0URLs, we can see which exploit kit landing page the script redirects to. Usually, these URLs are active for only a very short time.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog post was written by Kalpesh Mantri. Darkleech is an Apache module on the dark web that distributes malware&#8230;.<\/p>\n","protected":false},"author":695,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[76,180],"coauthors":[4136],"class_list":["post-49898","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-cybercrime","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Seeing Through Darkleech Obfuscation: a Quick Hack to Iframes | McAfee Blog<\/title>\n<meta name=\"description\" content=\"This blog post was written by Kalpesh Mantri. Darkleech is an Apache module on the dark web that distributes malware. This tool, which appeared in 2012,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seeing Through Darkleech Obfuscation: a Quick Hack to Iframes | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"This blog post was written by Kalpesh Mantri. Darkleech is an Apache module on the dark web that distributes malware. This tool, which appeared in 2012,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-27T17:56:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-20T06:16:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_1.png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Seeing Through Darkleech Obfuscation: a Quick Hack to Iframes\",\"datePublished\":\"2016-05-27T17:56:31+00:00\",\"dateModified\":\"2024-02-20T06:16:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/\"},\"wordCount\":903,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_1.png\",\"keywords\":[\"cybercrime\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/\",\"name\":\"Seeing Through Darkleech Obfuscation: a Quick Hack to Iframes | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_1.png\",\"datePublished\":\"2016-05-27T17:56:31+00:00\",\"dateModified\":\"2024-02-20T06:16:49+00:00\",\"description\":\"This blog post was written by Kalpesh Mantri. Darkleech is an Apache module on the dark web that distributes malware. This tool, which appeared in 2012,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_1.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Seeing Through Darkleech Obfuscation: a Quick Hack to Iframes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seeing Through Darkleech Obfuscation: a Quick Hack to Iframes | McAfee Blog","description":"This blog post was written by Kalpesh Mantri. Darkleech is an Apache module on the dark web that distributes malware. This tool, which appeared in 2012,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Seeing Through Darkleech Obfuscation: a Quick Hack to Iframes | McAfee Blog","og_description":"This blog post was written by Kalpesh Mantri. Darkleech is an Apache module on the dark web that distributes malware. This tool, which appeared in 2012,","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-05-27T17:56:31+00:00","article_modified_time":"2024-02-20T06:16:49+00:00","og_image":[{"url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_1.png","type":"","width":"","height":""}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Seeing Through Darkleech Obfuscation: a Quick Hack to Iframes","datePublished":"2016-05-27T17:56:31+00:00","dateModified":"2024-02-20T06:16:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/"},"wordCount":903,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_1.png","keywords":["cybercrime","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/","name":"Seeing Through Darkleech Obfuscation: a Quick Hack to Iframes | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_1.png","datePublished":"2016-05-27T17:56:31+00:00","dateModified":"2024-02-20T06:16:49+00:00","description":"This blog post was written by Kalpesh Mantri. Darkleech is an Apache module on the dark web that distributes malware. This tool, which appeared in 2012,","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_1.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/b1_1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Seeing Through Darkleech Obfuscation: a Quick Hack to Iframes"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/49898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=49898"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/49898\/revisions"}],"predecessor-version":[{"id":183180,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/49898\/revisions\/183180"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=49898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=49898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=49898"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=49898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}