DEV#POPPER Attacking developers via New Social Engineering Tactics
Threat actors masquerade as interviewers and send a ZIP file (onlinestoreforhirog.zip) to candidates as part of a fake interview, which contains legitimate files and a malicious JavaScript file (printfulRoute.js) that is obfuscated to evade detection. The obfuscated code uses techniques like base64 encoding, dynamic function names, and string concatenation to hide its functionality. After deobfuscation, […]
The post DEV#POPPER Attacking developers via New Social Engineering Tactics appeared first on Cyber Security News.