Researchers at Juniper Threat Labs warn that phishing attacks are utilizing a new obfuscation technique to hide malicious JavaScript.
“While investigating a sophisticated phishing attack targeting affiliates of a major American political action committee (PAC) in early January 2025, Juniper Threat Labs observed a new JavaScript obfuscation technique,” the researchers write.
“This technique was first described by a security researcher on X back in October 2024, highlighting the speed with which offensive security research can be incorporated into real-world attacks.”
The technique uses whitespace Unicode characters from the Korean alphabet to encode and conceal the malicious JavaScript, rendering it invisible to humans and security tools while still allowing it to execute when triggered.
“On October 8, 2024, Martin Kleppe first demonstrated this technique via a post on X,” Juniper explains. “A refinement of the technique, which was used verbatim in the phishing attack, was posted on October 28 and is demonstrated at https://aem1k[.]com/invisible/encoder/.
The encoding works by using two different Unicode filler characters, the Hangul half-width and the Hangul full width, to represent the binary values 0 and 1, respectively. Each group of 8 of these characters forms a single byte, representing an ASCII character. The entire payload sits invisibly in a script as a property, but is executed with a short bootstrap code when the property is accessed through a Proxy get() trap.”
Attackers are constantly looking for new ways to bypass technical security measures. New-school security awareness training can give your organization an essential layer of defense against social engineering attacks. KnowBe4 empowers your workforce to make smarter security decisions every day. Over 70,000 organizations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk.
BleepingComputer has the story.