CVE-2015-0311 (Flash up to 16.0.0.287) integrating Exploit Kits
Jump to navigation
Jump to search
(Publication) Google search: [1]
CVE-2015-0311 (Flash up to 16.0.0.287) integrating Exploit Kits | |
---|---|
Botnet | |
Malware | |
Botnet/malware group | |
Exploit kits | Angler, Nuclear Pack, RIG, Fiesta |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | CVE-2015-0311 |
CCProtocol | |
Date | 2015 / 2015-02-01 |
Editor/Conference | Malware don't need cofee |
Link | http://malware.dontneedcoffee.com/2015/01/cve-2015-0311-flash-up-to-1600287.html (Archive copy) |
Author | Kafeine |
Type | Blogpost |
Abstract
“ Patched with Flash 16.0.0.296 the CVE-2015-0311 has been first seen exploited by Angler EK ( 2015-01-20 ) , soon after used in "standalone" mode in huge malvert campaign (pushing either Reveton, either Bedep (doing adfraud and grabbing malware : Pony mostly from what I saw) )
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2015BFR449, editor = {Malware don't need cofee}, author = {Kafeine}, title = {CVE-2015-0311 (Flash up to 16.0.0.287) integrating Exploit Kits}, date = {01}, month = Feb, year = {2015}, howpublished = {\url{http://malware.dontneedcoffee.com/2015/01/cve-2015-0311-flash-up-to-1600287.html}}, }