An Adobe Flash Player vulnerability used by the Sofacy APT gang was also found in seven of the top exploit kits, according to an analysis by Recorded Future.
Tag Archives: Angler Exploit Kit
Sundown Exploit Kit ‘Larger Threat Than People Realize’
Cisco Talos identified the Sundown exploit kit as an up-and-coming contender that may soon rival RIG in terms of size and volume.
Inside the Demise of the Angler Exploit Kit
Researchers at Kaspersky Lab today confirmed that the cybercriminals behind the Lurk Trojan were also responsible for the development and distribution of the Angler Exploit Kit
Nuclear, Angler Exploit Kit Activity Has Disappeared
Researchers who study exploit kits are reporting that two major kits, Angler and Nuclear, may no longer be available.
Malvertising Campaign Hits Top Websites to Spread Ransomware
Hackers are always in search for an elite method to create loopholes in the cyberspace to implement the dark rules in the form of vulnerability exploitation.
Top Trustworthy sites such as The New York Times, BBC, MSN, AOL and many more are on the verge of losing their face value as a malwertized advertisement campaign are looming around the websites, according to SpiderLabs.
Here’s
Angler Exploit Kit Learns New Tricks, Finds Home On Popular Website
Angler Exploit evaded detection through new technique that bypasses Firefox and Chrome security protection.
New Silverlight Attacks Appear in Angler Exploit Kit
Exploits targeting a patched Silverlight vulnerability have found their way into the Angler Exploit Kit and victims are being hit with TeslaCrypt ransomware.
Nuclear Exploit Kit Spreading Cryptowall 4.0 Ransomware
An attacker working off domains belonging to Chinese registrar BizCN has been moving the Cryptowall 4.0 ransomware via the Nuclear Exploit Kit.
Threatpost News Wrap, October 12, 2015
Mike Mimoso and Chris Brook discuss the week in news–including how researchers disrupted a campaign using the Angler Exploit Kit, how a researcher was forced to pull a talk from a conference, and how a practical SHA-1 collision could be months away, not years.
WordPress Compromises Behind Spike in Neutrino EK Traffic
A rash of compromised WordPress websites is behind this week’s surge in Neutrino Exploit Kit traffic