Java Zero-Days and the Blackhole Exploit Kit

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

Java Zero-Days and the Blackhole Exploit Kit
Botnet
Malware
Botnet/malware group
Exploit kits Blackhole
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 06/09/2012
Editor/Conference Trend Micro
Link http://blog.trendmicro.com/java-zero-days-and-the-blackhole-exploit-kit/ (Archive copy)
Author Jon Oliver
Type

Abstract

Last week’s Java zero-day vulnerability has been exploited by many exploit kits in the wild, including the familiar Blackhole Exploit Kit.

In this blog entry, we thought we would describe some of the outbreaks related to this attack we’ve seen in the past week or so. Our automated processes that are a part of the Trend Micro™ Smart Protection Network™ started detecting and blocking these attacks as soon as they were spotted in the wild.

A number of methods have been used to direct Internet users to the landing pages hosting these attacks, including:

Spam runs Compromised sites Redirection from pornographic websites Malvertising

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1150,
   editor = {Trend Micro},
   author = {Jon Oliver},
   title = {Java Zero-Days and the Blackhole Exploit Kit},
   date = {09},
   month = Jun,
   year = {2012},
   howpublished = {\url{http://blog.trendmicro.com/java-zero-days-and-the-blackhole-exploit-kit/}},
 }