Exploit kits go cryptomining – Summer 2018 edition

| | Exploit Kit
Overview This is the ninth edition of our Quarterly Exploit Kit activity roundup series, in which we share our analysis of recent exploit kit activity. Exploit kits (EKs) are rapidly deployable software ...
The Year Targeted Phishing Went Mainstream

The Year Targeted Phishing Went Mainstream

A story published here on July 12 about a new sextortion-based phishing scheme that invokes a real password used by each recipient has become the most-read piece on KrebsOnSecurity since this site ...

Top Exploit Kit Activity Roundup – Spring 2018

| | Exploit Kit
Overview This is the eighth in a series of blogs by the Zscaler ThreatLabZ research team collecting and analyzing the recent activity of the top exploit kits. Exploit kits (EKs) are rapidly ...
Magnitude exploit kit switches to GandCrab ransomware

Magnitude exploit kit switches to GandCrab ransomware

After being faithful to its own Magniber ransomware for several months, Magnitude EK joins others to adopt GandCrab. Categories: Exploits Threat analysis Tags: EKexploit kitgandcrabMagnituderansomware (Read more...) The post Magnitude exploit kit ...
Hermes ransomware distributed to South Koreans via recent Flash zero-day

Hermes ransomware distributed to South Koreans via recent Flash zero-day

An uncommon exploit kit adds a fresh Flash Player exploit to distribute the Hermes ransomware in South Korea. Categories: Exploits Threat analysis Tags: CVE-2018-4878EKexploit kitFashHermesransomware (Read more...) The post Hermes ransomware distributed ...
Avzhan DDoS bot dropped by Chinese drive-by attack

Avzhan DDoS bot dropped by Chinese drive-by attack

The Avzhan DDoS bot is back in the wild again, this time being dropped by a Chinese drive-by attack. In this post, we'll take a deep dive into its functionality and compare ...
Drive-by download campaign targets Chinese websites, experiments with exploits

Drive-by download campaign targets Chinese websites, experiments with exploits

This custom made drive-by download attack targets some Chinese websites and their visitors while experimenting with exploits. Categories: Threat analysis Tags: Chinesecoinhivedrive-byEKexploit kitexploitsFlash PlayerInternet Explorersvchost.exe (Read more...) The post Drive-by download campaign ...

Top Exploit Kit Activity Roundup – Winter 2018

Overview: This is the seventh in a series of blogs collecting the recent activity of the current top exploit kits. Exploit kits are rapidly deployable software packages designed to leverage vulnerabilities in ...
Disdain exploit kit served with a side of social engineering

Disdain exploit kit served with a side of social engineering

Exploits may not be enough as threat actors combine them with social engineering in a new Disdain exploit kit attack method. Categories: Exploits Threat analysis Tags: DisdainEKexploit kitneutrino (Read more...) The post ...

Terror Exploit Kit via Malvertising campaign

| | Exploit Kit
Terror Exploit Kit (EK) is one of the newer EKs that came to the scene in early 2017 and was mentioned in our Winter 2017 quarterly EK roundup where it was mainly ...
Loading...