HTML encoding and white space
The FakeAV pages often encode random HTML elements using HTML entities.
| Use of HTML entities in the TITLE tag |
| Use of HTML entities in tag attributes |
JavaScript and CSS encoding
While most of the CSS information is contained in external files, some inline CSS is included within the HTML document. Attackers use hexadecimal encoding (\xXX) in combination with JavaScript. Again, the encoded characters differ from page to page.
| Encoded inline CSS |
| Hexadecimal encoding in JavaScript code |
The FakeAV pages use some JavaScript obfuscation, as seen in most malicious pages, but it tends to be very light, and the code spans over a few line only.
| Obfuscated JavaScript |
I have found over 100 variants of the Fake AV pages in the past year. The code and the obfuscation techniques have changed quite a bit, but the result is still very much the same. I have encountered only about 10 visually different Fake AV pages.
-- Julien



