Results for 'neutrino'

Cybercrime | News

Neutrino EK: fingerprinting in a Flash

June 28, 2016 - Since the disappearance of Angler EK, exploit kit activity is at one of its lowest it has been in a long...

CONTINUE READING
Cybercrime | News

Neutrino exploit kit fills in for Angler EK in recent malvertising campaigns

June 11, 2016 - Update (06/13/2016): Still no sign of Angler EK activity since late June 6th PST. In the meantime, the actor known as ihateclowns/SadClowns...

CONTINUE READING
Exploits and vulnerabilities | News

A Look At A Neutrino EK Distributor

April 6, 2016 - We’ve spotted a distribution channel for the Neutrino exploit kit which starts with malicious iframe injections. Digging a little more, we found...

CONTINUE READING
Exploits and vulnerabilities | News | Threats

New Neutrino EK Campaign Drops Andromeda

October 18, 2015 - On October 15, we started seeing a new pattern of redirections to the Neutrino Exploit Kit via compromised websites. What actually...

CONTINUE READING
Exploits and vulnerabilities | News | Threats

Inside Neutrino botnet builder

August 19, 2015 - It is common practice among cybercriminals to sell their products in the form of packages, consisting of: Such packages are commercial...

CONTINUE READING
News | Threats

Neutrino Delivers Fake Flash Malware Hosted on SkyDrive

January 29, 2014 - As cloud computing becomes more popular, malware authors are also taking interest in using this technology to store their own files—except,...

CONTINUE READING
MALWARE

Info stealers

Short bio The term info stealer is self-explanatory. This type of malware resides in an infected computer and gathers data in...

CONTINUE READING
MALWARE

Exploit kits

Short bio An exploit kit is a toolkit designed to facilitate the exploitation of client-side vulnerabilities most commonly found in browsers...

CONTINUE READING
MALWARE

Botnets

Short bio Botnets are networks of computers infected by a botnet agent that are under hidden control of a third party....

CONTINUE READING