Blackhole

From Botnets.fr
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

(Exploit kit) Link to the old Wiki page : [1]

Blackhole
Alias
Target
Origin
Group
Distribution vector Iframeshop
Language
Operation/Working group
BeginYear
EndYear
Status

Introduction

Features

CVE: CVE-2013-2465

Infrastructure

Commercialisation

Relations

Associated images

Publications

 AuthorEditorYear
1940 IPs for a BHEK/ULocker server - Nexcess-NetKafeine2012
An overview of exploit packsMila ParkourContagio2012
Behind the Captcha or Inside Blackhole Exploit Kit 2.0 - Exploit Kit Administration PanelKafeine2012
Black Dragon: "... and all will burn beneath the shadow of my wings"MalwageddonMalwageddon2013
Blackhole & Cridex: season 2 episode 1: Intuit spam & SSL traffic analysisAndré M. DiMino2012
Blackhole Ramnit - samples and analysisMila Parkour2012
Blackhole and Cool Exploit kits nearly extinctDennis FisherThreatpost2013
Blackhole exploit kit v2 on the risePradeep KulkarniZscaler2012
Blackhole, CVE-2012-0507 and CarberpDavid Harley
Aleksandr Matrosov
ESET2012
CVE-2012-5076 - Massively adopted - Blackhole update to 2.0.1Kafeine2012
CVE-2013-2465/CVE-2013-2471/CVE-2013-2463 integrating Exploit Kits -- jre7u21 CVE- jre6u45 and earlierKafeineMalware don't need cofee2013
Carberp + BlackHole = growing fraud incidentsDavid Harley
Aleksandr Matrosov
Eugene Rodionov
Dmitry Volkov
ESET2011
DGAs and cyber-criminals: a case studyManos Antonakakis
Jeremy Demar
Christopher Elisan
John Jerrim
Damballa
DarkMegi rootkit - sample (distributed via Blackhole)Mila ParkourContagio2012
Demystifying PobelkaMichael SandeeFox-IT2013
Dutch users served Sinowal for lunchRoland Dela PazTrendMicro2012
Fast look at an infection by a Blackhole Exploit Kit 2.0Kafeine2012
Inside Blackhole Exploits Kit v1.2.4 - Exploit Kit Control PanelKafeine2012
Java Zero-Days and the Blackhole Exploit KitJon OliverTrend Micro2012
Mac Flashback exploiting unpatched Java vulnerabilityBrodF-Secure2012
Rovnix Reloaded: new step of evolutionDavid Harley
Aleksandr Matrosov
Eugene Rodionov
ESET2012
The lifecycle of peer-to-peer (Gameover) ZeuSBrett Stone-GrossDELL SecureWorks2012