I received a suspicious looking SMS today with a link.
I checked out the page source code and came across this script between the <head> tags:
<script async="" src="/cdn-cgi/challenge-platform/h/b/scripts/invisible.js"></script>
Followed by this Javascript before the closing </body> tag:
<script type="text/javascript">
(function() {
window['__CF$cv$params'] = {
r:'6b649a602f2971b7',
m:'J73FGS_fZq.IaeC1KCPgjERVLL8gDE2oAjzEbjiY4Ag-1638280837-0-Abpq0oycrBK8Bv0q/J6Pr+UoONCrzxJSv/KPQ04DY9bwLV+8//8EpFKT9X24Ufq1a3N9rKXCCNcOqmGO/YQxH/xhf8WV5+2a+fzyB44hWtVUaRKMMvTdyZY5Ekc/pKY6WQ==',
s:[0xcd16bba2b7,0xa3485d56a8],
u:'/cdn-cgi/challenge-platform/h/b'
}
})();
</script>
I've tried decoding the string ending with ==, but the decoder I used spat out gibberish.
What other methods can I used to decode this? I'm curious to understand what it's doing.
