Java Zero-Days and the Blackhole Exploit Kit
(Publication) Google search: [1]
Java Zero-Days and the Blackhole Exploit Kit | |
---|---|
Botnet | |
Malware | |
Botnet/malware group | |
Exploit kits | Blackhole |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 06/09/2012 |
Editor/Conference | Trend Micro |
Link | http://blog.trendmicro.com/java-zero-days-and-the-blackhole-exploit-kit/ blog.trendmicro.com (blog.trendmicro.com Archive copy) |
Author | Jon Oliver |
Type |
Abstract
“ Last week’s Java zero-day vulnerability has been exploited by many exploit kits in the wild, including the familiar Blackhole Exploit Kit.
In this blog entry, we thought we would describe some of the outbreaks related to this attack we’ve seen in the past week or so. Our automated processes that are a part of the Trend Micro™ Smart Protection Network™ started detecting and blocking these attacks as soon as they were spotted in the wild.
A number of methods have been used to direct Internet users to the landing pages hosting these attacks, including:
Spam runs Compromised sites Redirection from pornographic websites Malvertising
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1150, editor = {Trend Micro}, author = {Jon Oliver}, title = {Java Zero-Days and the Blackhole Exploit Kit}, date = {09}, month = Jun, year = {2012}, howpublished = {\url{http://blog.trendmicro.com/java-zero-days-and-the-blackhole-exploit-kit/ blog.trendmicro.com}}, }