Home > Threat descriptions >

Trojan:JS/Redirector

Classification

Category: Malware

Type: Trojan

Aliases: Trojan:JS/Redirector, Trojan.Redirect

Summary


Trojan:JS/Obfuscated.Gen is a generic detection that identifies malicious HTML, Javascripts, PDF, or any scripting files that contain obfuscated code, which may be used by malware authors to evade antivirus signature detection, as well as making malicious scripts harder discover and analyze.

Generic detections are broad patterns of code or behavior that are used by security software to identify programs or files. If you suspect the detected file was incorrectly identified, go to: Removal: Resolve a False Positive.

Removal


Automatic action

Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.

Resolve a False Positive

Security programs will sometimes unintentionally identify a clean program or file as malicious if its code or behavior is similar to a known harmful program or file. This is known as a False Positive. In most cases, a False Positive is fixed in a subsequent database release. If you suspect the detected file is a False Positive, you can:

Knowledge Base

Find the latest advice in our Community Knowledge Base.

About the product

See the manual for your F-Secure product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details


These redirect scripts are typically hosted on malicious or compromised websites.

The unsolicited website the user is redirected to may have any or all of the following characteristics:

  • Pornographic
  • Hosts additional malware to be downloaded onto the visitor's computer
  • Steals data from the user
  • Use the augmented traffic to perpetrate fraud

The redirect scripts are usually written in JavaScript. Redirects that operate by exploiting vulnerabilities in the visitor's web browser or computer may also be considered exploits.

For a representative example of Trojan:JS/Redirector variants, see: