• Skip to primary navigation
  • Skip to content
  • Skip to primary sidebar
  • Skip to footer

Sucuri Blog

Website Security News

  • Products
    • Website Security Platform
    • Website Firewall (WAF)
    • Enterprise Website Security
    • Multisite Solutions
  • Features
    • Detection
    • Protection
    • Performance
    • Response
    • Backups
  • Partners
    • Agency Solutions
    • Partners
    • Referral Program
    • Ecommerce
  • Resources
    • Guides
    • Webinars
    • Infographics
    • SiteCheck
    • Reports
    • Email Courses
  • Immediate Help
  • Login
Labs Note

Legacy Mauthtoken Malware Continues to Redirect Mobile Users

November 4, 2020Krasimir Konov

FacebookTwitterSubscribe

During malware analysis, we regularly find variations of this injected script on various compromised websites: .

The variable “_0x446d” assigns hex encoded strings in different positions in the array. If we get the ASCII representation of the variable, we’ll end up with the following code:

var _0x446d=["_mauthtoken","indexOf","cookie","userAgent","vendor","opera","hxxps://zeep.ly/ev4Va","googlebot","test","substr","getTime","_mauthtoken=1; path=/;expires=","toUTCString","location"];

In this array, you can find a “shortened” redirect URL: hxxps://zeep[.]ly/ev4Va. These redirect URLs may change from site to site, otherwise the code remains the same for this injection.

The distinguishing part of the malware is the _mauthtoken cookie that it sets and checks to prevent redirects for returning visitors. This features makes troubleshooting much harder, since visitors can’t reproduce redirects.

The malware only redirects visitors on mobile devices. To accomplish this, it tests the browser’s user-agent string against a pretty long list of known mobile user agents, including a large number that have not been actively used for some time.

This malware itself isn’t new, either. We’ve been detecting and cleaning this injection for more than three years now. However, even in 2020, there are still many sites infected with it.

At the time of writing, PublicWWW returns 1441 sites containing the string “var _0x446d=[“\x5f\x6d\x61\x75\x74\x68\x74\x6f\x6b\x65\x6e” and 185 sites with a less obfuscated version containing the the document.cookie.indexOf(“_mauthtoken” string.

If you’ve received complaints from some of your site visitors about random unwanted redirects on mobile devices, make sure to scan your site for malware. Our online scanner SiteCheck detects both variations of this injection and can help you pinpoint the threat.

FacebookTwitterSubscribe

Categories: Security Education, Sucuri Labs, Website Malware Infections, Website SecurityTags: Black Hat Tactics, Hacked Websites, Labs Note, Malware, Redirects

About Krasimir Konov

Krasimir Konov is Sucuri's Malware Analyst who joined the company in 2014. Krasimir's main responsibilities include analyzing malicious code, signature creation and documentation of malware. His professional experience covers more than 10 years in the IT field, with nine years involved in IT/cyber security. When he’s not analyzing malware or writing Labs notes, you might find Krasimir riding his motorcycle and traveling the world. Connect with him on Twitter or LinkedIn.

Reader Interactions

Primary Sidebar

Socialize With Sucuri

We're actively engaged across multiple platforms. Follow us and let's connect!

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Instagram
  • RSS Feed

Join Over 20,000 Subscribers!

Sucuri Sidebar Malware Removal to Signup Page

Footer

Products

  • Website Firewall
  • Website AntiVirus
  • Website Backups
  • WordPress Security
  • Enterprise Services

Solutions

  • DDos Protection
  • Malware Detection
  • Malware Removal
  • Malware Prevention
  • Blacklist Removal

Support

  • Blog
  • Knowledge Base
  • SiteCheck
  • Research Labs
  • FAQ

Company

  • About
  • Media
  • Events
  • Employment
  • Contact
  • Testimonials
  • Facebook
  • Twitter
  • LinkedIn
  • Instagram

Customer Login

Sucuri Home

  • Terms of Use
  • Privacy Policy
  • Frequently Asked Questions

© 2023 Sucuri Inc. All rights reserved

Sucuri Cookie Policy
See our policy>>

Our website uses cookies, which help us to improve our site and enables us to deliver the best possible service and customer experience.