Uses random javascript files which have been obfuscated and hosted at
global.proper.io
Does not seem to be blocked by existing
proper.io
rulesSeen in being loaded in page headers on sites like
youngcons.com
, snopes.com, salon.com, etc using the following snippet. Bares resemblance to prebid.jsCode: Select all
<script>
var propertag = propertag || {};
propertag.cmd = propertag.cmd || [];
(function() {
var pm = document.createElement('script');
pm.async = true; pm.type = 'text/javascript';
var is_ssl = 'https:' == document.location.protocol;
pm.src = (is_ssl ? 'https:' : 'http:') + '//global.proper.io/{SOME RANDOM FILE}.min.js';
var node = document.getElementsByTagName('script')[0];
node.parentNode.insertBefore(pm, node);
})();
</script>