Behind the Captcha or Inside Blackhole Exploit Kit 2.0 - Exploit Kit Administration Panel
Jump to navigation
Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
(Publication) Google search: [1]
Behind the Captcha or Inside Blackhole Exploit Kit 2.0 - Exploit Kit Administration Panel | |
---|---|
Botnet | |
Malware | |
Botnet/malware group | |
Exploit kits | Blackhole |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-09-23 |
Editor/Conference | |
Link | http://malware.dontneedcoffee.com/2012/09/behind-captcha-or-inside-blackhole.html (Archive copy) |
Author | Kafeine |
Type |
Abstract
“ Available to its client since second week of september, the Blackhole Exploit Kit has been, according to Paunch, its coder, rewritten from scratch (<- You'll see all announced features here) . URL patterns are now different. Most improvements are focused on making "defenders" job a little harder.
(For previous version of Blackhole see : Inside Blackhole Exploits Kit v1.2.4 )
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1231, editor = {}, author = {Kafeine}, title = {Behind the Captcha or Inside Blackhole Exploit Kit 2.0 - Exploit Kit Administration Panel}, date = {23}, month = Sep, year = {2012}, howpublished = {\url{http://malware.dontneedcoffee.com/2012/09/behind-captcha-or-inside-blackhole.html}}, }