Contact Us

Newsletter Sign-Up

1 min read

New JavaScript Trick Allows Phishing Sites to Detect Virtual Machines

Mar 17, 2021 1:20:08 PM

Fish-hook

The MalwareHunter Team has discovered a new trick being leveraged by Phishing websites.

According to a recent tweet, attackers are using a JavaScript...er...script that allows malicious phishing websites to detect Virtual Machines that are poking around their ponds.

I promise, that's the last joke about fish.

Anyways, the "trick" uses the WebGL API to decipher the rendering engine used by the browser visiting their site.

If the WebGL API detects the visitor is using a software renderer (like SwiftShader, LLVMpipe or Virtual Box)), which are commonly used by virtual machines, it'll start a process that blocks the VM from viewing its content.

If it detects that (and a few other conditions like detecting color depth that's less than 24-bit or a screen height less than 100 pixels) the website won't display.

It looks like the exploit is based on this article from bannedit.github.io which describes Java's ability to detect virtual machines.

It's not uncommon that security researches find the need to strengthen their virtual machines to avoid malware detection and it looks like now they'll have to strengthen themselves against phishing attacks too.

Until you can do that, I suggest you read our Phishing prevention guide here: https://www.security7.net/guide/social-engineering/what-is-a-phishing-attack

Like our blog? Subscribe using the CTA in the upper right-hand corner of this page. Feel like sharing your thoughts with us? Use the comment section below.

Topics: Phishing
Carl Keyser

Written by Carl Keyser

Experienced Marketer & Graphic Designer. Professional skilled in Graphics, Branding & Identity, Typography, Adobe Creative Suite, Google Analytics, Google AdWords and HubSpot Inbound Marketing .

Featured