
We often talk and deobfuscate scripts aiming to hide their real and often
malicious intentions. But what if malicious attackers have become so efficient in their obfuscation, that they decide to show some
JAPH style in order to make them harder to analyze by visually obfuscating the scripts as you can see here?
About Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
0 Comments: