Difference between revisions of "Kore exploit kit"
Jump to navigation
Jump to search
m (1 revision imported) |
m (Text replacement - "/ www." to "/ |Site=www.") |
||
Line 1: | Line 1: | ||
{{Publication | {{Publication | ||
|Type=Blogpost | |Type=Blogpost | ||
|Link=http://www.kahusecurity.com/2013/kore-exploit-kit/ www.kahusecurity.com | |Link=http://www.kahusecurity.com/2013/kore-exploit-kit/ | ||
|Site=www.kahusecurity.com | |||
|Author=Darryl | |Author=Darryl | ||
|NomRevue=Kahu Security blog | |NomRevue=Kahu Security blog |
Latest revision as of 12:48, 31 July 2015
(Publication) Google search: [1]
Kore exploit kit | |
---|---|
Botnet | |
Malware | |
Botnet/malware group | |
Exploit kits | Kore |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2013 / 2013-07-18 |
Editor/Conference | Kahu Security |
Link | http://www.kahusecurity.com/2013/kore-exploit-kit/ (Archive copy) |
Author | Darryl |
Type | Blogpost |
Abstract
“ Recently, a reader passed on to me a very active TDS link that redirected users to one of four exploit packs. These packs led to some form of ransomware being installed on the victim’s machine. Analysis of these packs have been covered elsewhere but I wanted to document the analysis here in case there are changes. Since there’s a lot to go through, I’ll only cover the important bits.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1354, editor = {Kahu Security}, author = {Darryl}, title = {Kore exploit kit}, date = {18}, month = Jul, year = {2013}, howpublished = {\url{http://www.kahusecurity.com/2013/kore-exploit-kit/}}, }