Remove tag cyber-attack
article thumbnail

TA505 Cybercrime targets system integrator companies

Security Affairs

A first round of obfuscation technique was adopted by the attacker in order to make harder the analyst’s decoding process. Another fun fact was in the variable name the attacker attributed to the string “JavaScript”: emotionless. In particular the attacker refers to JavaScript through the object “emotionless.Language”.