2. Some malware is launching a window who's address bar starts "data:text/htlm;base64," followed by obfuscated code to launch the payload.
- Getting the address bar contents, as I was busy closing the window, was not possible. Session manager has it in its history, but I can't copy and paste. I suppose I could do a screen capture and look for some sort of OCR... But the problem here isn't the payload itself as much as the method of delivery.
4. I'm 99% sure this malware requires running a script in order to launch the attack. If it's wort it, I could set up a sandbox and see if I can watch what is coming from the poisoned site, though I would expect the malicious script is associated part of the site, which implies that being safe means "just don't go there".
Still, I didn't know the site was poison until after I visited. Would sure be nice to generically stop a future attack that uses the same method should I visit a different poisoned site.
Can I expect Noscript to stop this sort of attack?
How would I configure it?
Thanks!