HomeIntelligenceBrief
BREACH BRIEF🟠 High ThreatIntel

Obfuscated JavaScript Delivered via Phishing Email Targets Enterprise Endpoints

A phishing email with a RAR attachment dropped an obfuscated JavaScript file (SHA‑256 a8ba9b…) flagged by only 15 AV engines. The low detection rate suggests a novel payload that could bypass traditional defenses, posing a heightened third‑party risk.

LiveThreat™ Intelligence · 📅 April 10, 2026· 📰 isc.sans.edu
🟠
Severity
High
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
3 recommended
📰
Source
isc.sans.edu

Obfuscated JavaScript Delivered via Phishing Email Targets Enterprise Endpoints

What Happened — A phishing email containing a RAR archive delivered an obfuscated JavaScript file named “cbmjlzan.JS”. The script’s SHA‑256 hash is a8ba9ba93b4509a86e3d7dd40fd0652c2743e32277760c5f7942b788b74c5285 and is flagged as malicious by only 15 AV engines on VirusTotal.

Why It Matters for TPRM

  • Phishing remains a primary entry vector for supply‑chain and endpoint compromise.
  • Obfuscated scripts can bypass traditional signature‑based defenses, increasing the risk of undetected malware execution.
  • Early‑stage indicators (low AV detection) suggest a novel or low‑profile campaign that may target multiple third‑party relationships.

Who Is Affected — All industries that receive email attachments from external partners, especially those using Windows endpoints and legacy JavaScript execution environments.

Recommended Actions

  • Enforce strict attachment scanning and sandboxing for all inbound RAR files.
  • Deploy behavior‑based endpoint detection and response (EDR) to catch obfuscated script execution.
  • Review third‑party email security controls and ensure MFA is enforced for all privileged accounts.

Technical Notes — Attack vector: phishing email with RAR attachment → obfuscated JavaScript payload. No CVE referenced. The script likely functions as a downloader or credential‑stealer, but analysis is limited due to low AV coverage. Source: SANS Internet Storm Center

📰 Original Source
https://isc.sans.edu/diary/rss/32884

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.