Cybersecurity researchers have discovered a new company that uses malicious JavaScript injections to redirect site visitors to mobile devices to a Chinese progressive adult web application (PWA).
“While the useful load itself is not new (another fraudulent adult scam), the delivery method stands out,” – C/Side Himanshu Anand researcher – Note Tuesday analysis.
“Page malicious landing is a full-scale progressive web application (Pwa) Most likely, it strives to keep users longer and bypass the main browser guards. “
The company is intended for obvious filtration of desktop users, primarily focusing on mobile users. The activity has been described as an attack on the client’s side that uses third JavaScript manufacturers and only launches mobile devices.
Use PWAS, type of applications built using web technologies that provide a user experience similar to the native application built for a particular platform, such as Windows, Linux, Macos, Android or iOS, is considered an attempt to overcome security.
Attacks include the introduction of JavaScript code sites, which acts as a loader to cause redirect when the site is visited from devices running on Android, iOS and iPados, among others.
Redirecting is designed to bring users to the content of adult or other intermediaries of redirecting applications to view adult contents. After that, the pages accept the victims in the fake list of app stores for the intended Android and iOS apps.
“The use of PWA suggests that the attackers experiment with more persistent phishing methods,” Anand said. “Focus only on the mobile phone allows them to avoid many detection mechanisms.”