July 20, 2022, 2:16 p.m. | /u/Jonathan-Todd

cybersecurity www.reddit.com

Reading through this [recent reverse engineering breakdown](https://www.reddit.com/r/blueteamsec/comments/w3ltu3/analysis_of_a_trojanized_jquery_script_gootloader/?utm_source=share&utm_medium=ios_app&utm_name=iossmf) on a JavaScript based loader for a PowerShell / .NET loader, I realized the whole attack hinged on the user clicking a .js file downloaded outside of the browser.

It seems [pretty trivial](https://www.computerworld.com/article/3090146/blocking-javascript-can-stop-some-windows-malware.amp.html) to disable this horrible default on-click execution behavior in Windows through the GUI (and seems doable at scale in PowerShell) by changing the associated application.

My question is: Is just setting the default application to Notepad probably sufficient? Or is …

ad best practice cybersecurity domain js practice

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Network AWS Cloud &Firewall Engineer

@ Arthur Grand Technologies Inc | Plano, TX, United States

Lead Consultant, Data Centre & BCP

@ Singtel | Singapore, Singapore

Protocol Security Engineer

@ Osmosis Labs | Remote

Technical Engineer - Payments Security Specialist

@ H&M Group | Bengaluru, India

Intern, Security Architecture

@ Sony | Work from Home-CA