Search

Showing 48 results for: "Angler+EK".

These Are the Three Exploit Kits You Should Know About
By Marcos ColonIt's no secret that the threat landscape provides as many twists and turns as an M. Night Shyamalan flick, with new tactics and malware variants cropping up on a seemingly daily basis. With the enormous task of measurably reducing cyber risk within the business, security practitioners...
Malvertising redirecting victims to exploit kits
Although there's been a drop in the activity of exploit kits (EK), threat actors have adapted by redirecting unwitting victims to exploit kit servers, according to a post on the Symantec blog.As outlined by Siddhesh Chandrayan, an associate threat analysis engineer at Symantec, with the shutdown of ...
SentinelOne: In memory attacks loom large, leave little trace
A new report from SentinelOne has documented the rise of in-memory attacks. The evasive, fileless tactics are apparently eluding antivirus systems.SentinelOne's most recent Enterprise Risk Index catalogues threats that presented themselves in the second half of 2016. Unlike many other reports, the I...
South for the winter: Exploit kit activity quiet over last three months
Exploit kits didn't completely hibernate over the winter, but they didn't show much signs of life either, with no major changes to their features and a relatively low infection volume compared to malicious spam, according to Malwarebytes.In its Winter 2017 review of exploit kit activity, the company...
Exploit Kits: Where are they now?
Cyber criminals have long preferred automated infections (as opposed to social engineering) because they can tap into a much wider market. For that, exploit kits represent the most popular way to seamlessly infect a computer with ‘drive-by download' attacks via malvertising or compromised websites.I...
No honour among thieves: Sundown EK stealing exploits
The Sundown Exploit Kit (EK) has been caught thieving other thieves' property.Often considered to be of little interest by those on the frontline, Sundown's developers have started to get their act together.  Researchers at Trustwave detailed the EK's practice of stealing other kits' exploits a...
69% of email attacks with malicious attachments in Q2 contained Locky
The first five months of 2016 were dominated by malicious email campaigns, the quick emergence of new ransomware variants, one of the largest botnets in the world went dark, and the Angler exploit kit (EK) went silent—all leading to a strangely quiet June.  Proofpoint has published its quarterl...
In a first, CryptXXX ransomware spread via spam
For the first time ever, CryptXXX ransomware is being distributed via malicious document attachments in email campaigns.Proofpoint researchers said the malware was initially spread via the Angler and Neutrino exploit kits (EKs), but in the wake of Angler's disappearance the threat actors normal...

You can skip this ad in 5 seconds