1 min read

Injeksi Indihome atau Telkom Speedy

Indihome atau Telkom Speedy sepertinya mulai gencar dalam menyelipkan script iklan mereka pada web browser, dan script ini disimpan pada baris paling bawah, sebelum tag <body>

<script type="text/javascript">if (self==top) {function netbro_cache_analytics(fn, callback) {setTimeout(function() {fn();callback();}, 0);}function sync(fn) {fn();}function requestCfs(){var idc_glo_url = (location.protocol=="https:" ? "https://" : "http://");var idc_glo_r = Math.floor(Math.random()*99999999999);var url = idc_glo_url+ "cfs2.uzone.id/2fn7a2/request" + "?id=1" + "&enc=9UwkxLgY9" + "&params=" + "4TtHaUQnUEiP6K%2fc5C582ECSaLdwqSpnZhUxX77pLNDRqTI26MtTChTguuWxhDGun1ovOuxWqtp9eYVBY1pn3FtNEBHSR8b%2fEn2teqQQ%2bsvFy%2bjpOCxJCBRZXD4u8YetS6EfMzL16svsUF%2fuftV%2bj6%2fKClrjJVwii5iqzKeMyosPfmoVWJdylU1lE%2byXXK8Vhsts48su%2bvQpvdJv8n1%2bKJjn9FoNss1IxSqznEkDsW5fGPUmjfWn8CxJE0Jvd2oX%2fQuW%2fO6vE28%2bnZpVJSH%2f6NR%2fW7Tba632RNh3%2frDHxAFwd%2fCoE7KSylk7qobw%2bdMnqw9jN1vsETia4gvD3bwLbj4jM1ka0DraQSRA7khnt6f8y8o69ZZBpyHvzS4aTfS5mdbN4r6rACemAzrDhHnNddbadoIJynHaJOK%2fxJqZ9UqCBNGXe%2fFAAAmCadfNr4f2g5gvv68zx7v1DUDvOYLAh3%2b6IoV7I5IXKYFjvgn0U23vPMLpbFz%2bFyNlmfgGwCVF8NcRlaCVMP8CIkmQAF5l2I1vGYtw7GoL" + "&idc_r="+idc_glo_r + "&domain="+document.domain + "&sw="+screen.width+"&sh="+screen.height;var bsa = document.createElement('script');bsa.type = 'text/javascript';bsa.async = true;bsa.src = url;(document.getElementsByTagName('head')[0]||document.getElementsByTagName('body')[0]).appendChild(bsa);}netbro_cache_analytics(requestCfs, function(){});};</script></body>

Agak miris, misalnya ada kode dengan nama netbro, jadi inget ceritanya big brother always watching you :p
Solusi untuk injeksi ini adalah dengan mewajibkan situs memakai SSL atau dengan HTTPS