HackDig : Dig high-quality web security articles for hacker

New Disdain Exploit Kit Detected in the Wild

By Chaoying Liu and Joseph C. Chen The exploit kit landscape has been rocky since 2016, and we’ve observed several of the major players—Angler, Nuclear, Neutrino, Sundown—take a dip in operations or go private. New kits have popped up sporadically since then, sometimes revamped from old sources, but none have really gained traction. Despite that fact,
Publish At:2017-08-17 08:05 | Read:1476 | Comments:0 | Tags:Exploits exploit kit exploit

ProMediads Malvertising and Sundown-Pirate Exploit Kit Combo Drops Ransomware and Info Stealer

With additional insights/analysis from Chaoying Liu We’ve uncovered a new exploit kit in the wild through a malvertising campaign we’ve dubbed “ProMediads”. We call this new exploit kit Sundown-Pirate, as it’s indeed a bootleg of its precursors and actually named so by its back panel. ProMediads has been active as early as 2016, employing Rig and Sundown exp
Publish At:2017-07-19 15:35 | Read:1142 | Comments:0 | Tags:Bad Sites Exploits exploit kit LockPOS malvertising ProMedia

AdGholas Malvertising Campaign Employs Astrum Exploit Kit

At the end of April this year, we found Astrum exploit kit employing Diffie-Hellman key exchange to prevent monitoring tools and researchers from replaying their traffic. As AdGholas started to push the exploit, we saw another evolution: Astrum using HTTPS to further obscure their malicious traffic. We spotted a new AdGholas malvertising campaign using the A
Publish At:2017-06-20 11:50 | Read:1415 | Comments:0 | Tags:Bad Sites Ransomware AdGholas Astrum exploit kit malvertisin

Will Astrum Fill the Vacuum in the Exploit Kit Landscape?

The decline of exploit kit activity—particularly from well-known exploit kits like Magnitude, Nuclear, Neutrino, and Rig during the latter half of 2016—doesn’t mean exploit kits are throwing in the towel just yet. This is the case with Astrum (also known as Stegano), an old and seemingly reticent exploit kit we observed to have been updated multiple times as
Publish At:2017-05-18 23:10 | Read:1788 | Comments:0 | Tags:Exploits Vulnerabilities Astrum diffie-hellman exploit kit e

EITest Corners Chrome Users with Social Engineering, Delivers Fleercivet Trojan

There are numerous ways to redirect a user to an exploit kit. Some of these methods are quite sophisticated. Take pseudo-Darkleech, for instance. This attack campaign injects malicious code into WordPress core files. That code creates a malicious iframe that redirects the user to a landing page for an exploit kit. In so doing, the campaign builds off Darklee
Publish At:2017-01-23 02:15 | Read:1384 | Comments:0 | Tags:Cyber Security Featured Articles Exploit Kit malware social

Got Outdated Software? RIG Exploit Kit and Cerber Ransomware Hope You Say ‘Yes’

Some digital threats are more serious than others but when it comes to unpatched software, nothing’s worse than an exploit kit. These software packages come preprogrammed with the ability to exploit active security issues on vulnerable computers.If they find one such hole agape, they’ll use their exploit code to download ransomware and other badd
Publish At:2017-01-20 00:35 | Read:1928 | Comments:0 | Tags:Cyber Security Featured Articles Exploit Kit pseudo-Darkleec

Updated Sundown Exploit Kit Uses Steganography

This year has seen a big shift in the exploit kit landscape, with many of the bigger players unexpectedly dropping out of action. The Nuclear exploit kit operations started dwindling in May, Angler disappeared around the same time Russia’s Federal Security Service made nearly 50 arrests last June, and then in September Neutrino reportedly went private and sh
Publish At:2016-12-29 13:35 | Read:2414 | Comments:0 | Tags:Exploits Malware Vulnerabilities exploit kit steganography S

Stegano campaign exposed millions netizens via attack code in pixels of ads banners

Stegano campaign – Millions of people visiting major websites may have been infected with malicious code that was embedded in pixels of the ads banners. A single pixel could be used to compromise your PC, millions of people visiting major websites over the past months may have been infected with malicious code that was embedded in pixels of the ads ban
Publish At:2016-12-07 15:45 | Read:1534 | Comments:0 | Tags:Breaking News Cyber Crime Malware cybercrme exploit kit Hack

CryptoLuck Ransomware spread through the RIG-E Exploit Kit

CryptoLuck ransomware is a new strain of malware discovered by the researcher Kafeine, that is being distributed via the RIG-E exploit kit. The notorious researcher Kafeine has spotted a new strain of ransomware dubbed CryptoLuck. The malware leverages DLL hijacking and exploits the legitimate GoogleUpdate.exe executable to infect computers. The ransomware a
Publish At:2016-11-17 16:40 | Read:1766 | Comments:0 | Tags:Breaking News Malware CryptoLuck ransomware Cybercrime explo

CryptoLuck Ransomware Infects Victims Using Signed GoogleUpdate.exe

A new ransomware called “CryptoLuck” is infecting victims via a legitimate, code-signed program from Google known as “GoogleUpdate.exe.”Security researcher Kafeine spotted the RIG-E (Empire) exploit kit distributing CryptoLuck via malvertising. It’s not the first time they’ve detected an exploit kit campaign distributing r
Publish At:2016-11-16 20:25 | Read:1624 | Comments:0 | Tags:Latest Security News CryptoLuck Exploit Kit Google ransomwar

Bizarro Sundown Exploit Kit Distributing Locky Ransomware via ShadowGate

The Bizarro Sundown exploit kit is spreading two versions of Locky ransomware via the still-active ShadowGate malvertising campaign.In October, Trend Micro spotted two versions of Bizarro Sundown, a modification of the earlier Sundown exploit kit which rose to prominence with RIG following Neutrino’s demise.The first iteration reared its ugly head at t
Publish At:2016-11-04 20:25 | Read:1537 | Comments:0 | Tags:Latest Security News Bizarro Sundown Exploit Kit Malvertisin

RIG Exploit Kit the Final Destination of HookAds Malvertising Campaign

The HookAds malvertising campaign redirects users to a landing page for the RIG exploit kit that comes prepackaged with all types of baddies.HookAds, which got its name from a string found by Malwarebytes researchers in the delivery URL, works as follows.A malvertising chain redirects visitors to adult websites that sometimes generate millions of views a mon
Publish At:2016-11-02 13:25 | Read:1214 | Comments:0 | Tags:Latest Security News Exploit Kit Flash Malvertising RIG expl

RIG Exploit Kit Begins Distributing CrypMic Ransomware After ShadowGate Takedown

On June 7, 2016, the Angler exploit kit all of a sudden disappeared. It’s unclear exactly what led to Angler’s demise, but all reports indicate the exploit kit shut down after Russian authorities arrested 50 members of a hacker group that developed Lurk malware along with Angler.So, what did the exploit kit world do in response? It did what it al
Publish At:2016-09-22 19:30 | Read:2438 | Comments:0 | Tags:Cyber Security Featured Articles Angler botnet Exploit Kit N

Survey: Only 34% of IT Pros ‘Very Confident’ They Could Recover from Ransomware

Ransomware is having quite the year. According to the FBI, crypto-malware authors extorted more than 200 million USD from users in the first three months of 2016. They’re well on their way to raking in over one billion dollars by the end of the year.Part of the reason ransomware developers are doing so well, the FBI explains in a letter, is because the
Publish At:2016-09-02 06:20 | Read:1669 | Comments:0 | Tags:Featured Articles IT Security and Data Protection black hat

Exploit kit traffic drops by 96% since April, what is happening?

The exploit kit landscape is rapidly changing,the Angler and Nuclear EK disappeared and overall malicious traffic drops by 96% since April. As highlighted by security experts the threat landscape is in continuous evolution, despite the criminal underground was monopolized by Angler and Nuclear exploit kits for several years other EKs represent a serious thre
Publish At:2016-06-21 23:00 | Read:2324 | Comments:0 | Tags:Breaking News Cyber Crime Malware Angler EK exploit kit malw


Share high-quality web security related articles with you:)


Tag Cloud