Blackhole

From Botnets.fr
Jump to: navigation, search

(Exploit kit) Link to the old Wiki page : [1]

Blackhole
Alias
Target
Origin
Group
Distribution vector Iframeshop
Language
Operation/Working group
BeginYear
EndYear
Status

Introduction

Features

CVE: CVE-2013-2465

Infrastructure

Commercialisation

Relations

Associated images

Publications

 AuthorEditorYear
1940 IPs for a BHEK/ULocker server - Nexcess-NetKafeine2012
An overview of exploit packsMila ParkourContagio2012
Behind the Captcha or Inside Blackhole Exploit Kit 2.0 - Exploit Kit Administration PanelKafeine2012
Black Dragon: "... and all will burn beneath the shadow of my wings"MalwageddonMalwageddon2013
Blackhole & Cridex: season 2 episode 1: Intuit spam & SSL traffic analysisAndré M. DiMino2012
Blackhole Ramnit - samples and analysisMila Parkour2012
Blackhole and Cool Exploit kits nearly extinctDennis FisherThreatpost2013
Blackhole exploit kit v2 on the risePradeep KulkarniZscaler2012
Blackhole, CVE-2012-0507 and CarberpDavid Harley
Aleksandr Matrosov
ESET2012
CVE-2012-5076 - Massively adopted - Blackhole update to 2.0.1Kafeine2012
CVE-2013-2465/CVE-2013-2471/CVE-2013-2463 integrating Exploit Kits -- jre7u21 CVE- jre6u45 and earlierKafeineMalware don't need cofee2013
Carberp + BlackHole = growing fraud incidentsDavid Harley
Aleksandr Matrosov
Eugene Rodionov
Dmitry Volkov
ESET2011
DGAs and cyber-criminals: a case studyManos Antonakakis
Jeremy Demar
Christopher Elisan
John Jerrim
Damballa
DarkMegi rootkit - sample (distributed via Blackhole)Mila ParkourContagio2012
Demystifying PobelkaMichael SandeeFox-IT2013
Dutch users served Sinowal for lunchRoland Dela PazTrendMicro2012
Fast look at an infection by a Blackhole Exploit Kit 2.0Kafeine2012
Inside Blackhole Exploits Kit v1.2.4 - Exploit Kit Control PanelKafeine2012
Java Zero-Days and the Blackhole Exploit KitJon OliverTrend Micro2012
Mac Flashback exploiting unpatched Java vulnerabilityBrodF-Secure2012
Rovnix Reloaded: new step of evolutionDavid Harley
Aleksandr Matrosov
Eugene Rodionov
ESET2012
The lifecycle of peer-to-peer (Gameover) ZeuSBrett Stone-GrossDELL SecureWorks2012