Skip to content Dark Web Informer - Cyber Threat Intelligence
IOC

IOC Alert: Kongtuke JavaScript Payload Masquerading as Restaurant Website

📖 Overview

A JavaScript payload associated with the Kongtuke malware family has been discovered hosted on a compromised domain masquerading as a restaurant website. The malicious script is delivered via js.php, a common filename used in JavaScript injection attacks, and is believed to be part of a broader payload delivery campaign. Confidence is assessed at 100%.


📌 Key Details

FieldInformation
TypeURL
Indicatorhttps://prixmatech[.]com/js.php
Threat TypePayload Delivery
Malwarejs.kongtuke
Confidence100%
Date14 Oct 2025 – 18:19:55 UTC
TagsKongtuke
Reportermonitorsg
ReferenceNone

🔎 URLScan Result



🛡️ Defensive Guidance

  • Block access to prixmatech[.]com and any requests to /js.php endpoints across DNS, proxy, and web gateways.
  • Inspect web server logs for any evidence of injected JavaScript payloads or external script loading from suspicious domains.
  • Monitor for execution of scripts or network calls tied to Kongtuke signatures.
  • Deploy content security policies (CSP) to limit JavaScript execution from untrusted origins.

⚠️ This IOC highlights the use of legitimate-looking commercial websites as decoy fronts for distributing JavaScript-based malware like Kongtuke, which often targets users through embedded scripts or drive-by infection techniques.

Latest