When I deploy my web app to Azure, I see the following script in the head
<html lang="en">
<head><script src="/arow-many-my-Songue-ript-ister-her-owne-Thou-Hon" async></script>
In each environment the script has a different name, but it’s always a list of “almost English” words concatenated with a dash. For example, in another environment, the script is
<script src="/robattemper-swell-know-shappe-Minity-fie-in-Cap-" async></script>
If I run the app locally, the script is not included. The content of the script is minified and obfuscated, so I can’t tell what it’s doing by reading the code. I’ve unminified the script and uploaded it to GitHub.
I suspect this script might be malware because
- the content has been aggressively obfuscated (as opposed to just minified)
- the filename gives no clues about what the script does or where it comes from
- the script is not included when I run the app locally, so it probably doesn’t not originate from the source repository
Ideally, I’d like to figure out where this script comes from and what it’s doing, but in the meantime, I’d like to disable it.