How Fake Investment Websites Use JavaScript to Trick You – A Real-World Case Study
Link - https://www.dropbox.com/scl/fo/7ar0jqgp292g4l0nci6ha/AHwOspBuwbRa2ospNbryRIs?rlkey=3qgzoghd8sqn5ld1s4hc207y5&st=9ugfphtl&dl=0
------------------------------------------------------
analysis of file 21-5-25(b).txt
| # | Threat Category | Detection Status | Details / Notes |
|---|---|---|---|
| 1 | Obfuscated JavaScript | ❌ Not Detected | Code is mostly readable, no eval/unescape patterns found. |
| 2 | Malicious Patterns | ✅ Detected | Fake investment pitch, unrealistic profits, urgency cues, impersonation of public figures and agencies. |
| 3 | Auto-Download Triggers | ❌ Not Detected | No automatic file downloads or forced downloads observed. |
| 4 | Fake Login Forms | ✅ Detected | Embedded iframe-based form impersonates legitimate financial platforms. |
| 5 | Suspicious Form Actions | ✅ Detected | Form submits data to shady third-party domain whiteelephantmedia.info. |
| 6 | Hidden Redirects | ✅ Detected | JavaScript rewrites all links with query parameters dynamically; potential redirection mechanism. |
| 7 | Encoded URL Decoding | ⚠️ Partial | Parameters like subid, token, and pixel are dynamically set; not deeply encoded but obfuscated intent. |
| 8 | External Script Calls | ✅ Detected | Facebook Pixel, Google Tag Manager, and JS from suspicious CDN (whiteelephantmedia.info). |
| 9 | Misused CDN or Hosting | ✅ Detected | Uses third-party CDN-style host to load potentially malicious scripts and form content. |
| 10 | Keylogging Scripts | ❌ Not Detected | No key event tracking observed in current script. |
| 11 | Session or Cookie Theft Attempts | ⚠️ Suspicious Use | Collects device info via localStorage and cookies, but no clear theft detected. |
| 12 | Tracking Beacons or Pixels | ✅ Detected | Facebook tracking pixel with fallback 1x1 image tag for no-JS environments. |
| 13 | De-obfuscation of Code | ❌ Not Required | Code is readable and doesn't require unpacking. |
| 14 | Minified JavaScript Expansion | ❌ Not Required | Scripts are already expanded or inline. |
| 15 | Device Fingerprinting Scripts | ✅ Detected | Checks for device type via navigator.userAgent and stores in localStorage. |
| 16 | Browser Exploit Code | ❌ Not Detected | No deprecated or exploitative browser APIs used. |
| 17 | Inline Event Abuses | ✅ Detected | Uses onclick and scroll triggers to focus user on registration form. |
| 18 | Permission Abuse | ❌ Not Detected | No access to camera, mic, clipboard, or geolocation. |
| 19 | Hidden or Invisible Elements | ✅ Detected | Comments and red-box elements used to simulate urgency and legitimacy. |
| 20 | Fake UI Overlays | ✅ Detected | Entire site mimics The Indian Express interface but is a fake clone. |
🧾 Summary:
-
Threat Level: 🔴 High
-
Type: Phishing / Financial Scam
-
Primary Risk: Data theft and fraud via deceptive form and UI.
=====================================================================
security and threat analysis of the file 21-5-25(b).txt,
🔍 Checklist-Based Threat Analysis
1. Obfuscated JavaScript
-
❌ Obfuscation Not Detected – The code is readable and mostly plain. However, some patterns in dynamic param generation (
subid,token) are suspicious.
2. Malicious Patterns
-
✅ Detected – Common traits of scams/phishing:
-
Misusing trusted names (e.g. Anand Mahindra, RBI, Infosys).
-
Unrealistic returns and fake testimonials.
-
Social engineering pressure ("964 spots remaining", "register now").
-
3. Auto-Download Triggers
-
❌ Not Detected – No evidence of scripts forcing downloads.
4. Fake Login Forms
-
✅ Detected – There's a form embedded via iframe that resembles legitimate platforms but is hosted on
whiteelephantmedia.info, a suspicious domain.
5. Suspicious Form Actions
-
✅ Detected – Data from the form is submitted to a non-trusted, third-party domain with dynamic query strings (high risk of phishing/data theft).
6. Hidden Redirects
-
✅ Detected – The page modifies all anchor (
<a>) tags via JavaScript to append tracking and token parameters. While not hidden, it manipulates links in suspicious ways.
7. Encoded URL Decoding
-
⚠️ Partially Detected – Obfuscation is light, but query params like
token,pixel, and dynamic subIDs are injected in a way that's potentially misleading.
8. External Script Calls
-
✅ Detected
-
Facebook Pixel:
connect.facebook.net/fbevents.js -
Google Tag Manager
-
jQuery from suspicious CDNs like
whiteelephantmedia.info -
These allow extensive tracking and possibly cross-site scripting.
-
9. Misused CDN or Hosting
-
✅ Detected – Uses
whiteelephantmedia.infoand CDN-style paths to serve tracking and potentially malicious JS.
10. Keylogging Scripts
-
❌ Not Detected – No direct evidence of keylogging in current scripts.
11. Session or Cookie Theft Attempts
-
⚠️ Suspicious Use – Cookies and localStorage used to store device, referrer, and user-agent data. Not outright theft, but ripe for profiling or tracking.
12. Tracking Beacons or Pixels
-
✅ Detected
-
Facebook Pixel.
-
1x1
<img>fallback for tracking even when JavaScript is disabled.
-
13. De-obfuscation of Code
-
❌ Not needed – code is readable, no encryption/packing found.
14. Minified JavaScript Expansion
-
❌ Not applicable – inline JS is already unminified.
15. Device Fingerprinting Scripts
-
✅ Detected – Uses
navigator.userAgent,localStorage, and device type inference (e.g., checking foriPhone) to tailor tracking.
16. Browser Exploit Code
-
❌ Not Detected – No usage of deprecated/dangerous APIs like
document.write(eval(...)),ActiveXObject, etc.
17. Inline Event Abuses
-
✅ Detected – Extensive use of
onclick, jQuery event hooks, and scroll manipulation to force user focus on forms.
18. Permission Abuse
-
❌ Not Detected – No evidence of accessing camera, microphone, or clipboard.
19. Hidden or Invisible Elements
-
✅ Detected – Fake comment sections, highly stylized containers (red boxes, attention banners) used for social engineering.
20. Fake UI Overlays
-
✅ Detected – Appears like a news article from The Indian Express, but all content is fabricated. This is a classic fake UI overlay scam page.
🚨 Conclusion: HIGH RISK / SCAM PAGE
-
This webpage is not legitimate and likely constitutes a phishing or financial scam.
-
It impersonates real institutions (RBI, Infosys, Mahindra) and spoofs a reputable news site.
-
It uses deceptive layout, emotional triggers, manipulative testimonials, and external scripts to harvest data and possibly initiate fraud.
✅ Recommended Actions
-
Do not interact with the site or submit any data.
-
Report the domain (
whiteelephantmedia.info) to:

Comments
Post a Comment