CyberWire Daily

Caught in the funnel. [Research Saturday]

17 snips
Jan 24, 2026
Andrew Northern, Principal Security Researcher at Censys who studies web-based malware, walks through multi-stage JavaScript injects and how compromised sites funnel victims through shared redirect chokepoints. He outlines a tracing method to map those chains. Topics include fake CAPTCHAs, reuse of script paths, blockchain-based hiding, and practical defender detection and mitigation steps.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Compromised Sites Funnel To Few Chokepoints

  • Large numbers of compromised sites funnel victims into a small set of shared redirectors and payload hosts.
  • Monitoring those chokepoints yields higher-confidence visibility than chasing tens of thousands of edge sites.
ADVICE

Hunt With Seed Patterns And Graphs

  • Hunt using seed patterns like fake CAPTCHA templates, script names, and HTML snippets to find injects at scale.
  • Build graphs of redirects and shared resources to identify and validate choke points before manual reconstruction.
INSIGHT

Shared Techniques Make Detection Feasible

  • Attack clusters share techniques and swap tricks rapidly, so copied patterns can indicate active campaigns.
  • Reusable injection targets like commonly used JS libraries and resource paths make detection feasible.
Get the Snipd Podcast app to discover more snips from this episode
Get the app