Kore exploit kit
Jump to navigation
Jump to search
(Publication) Google search: [1]
Kore exploit kit | |
---|---|
Botnet | |
Malware | |
Botnet/malware group | |
Exploit kits | Kore |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2013 / 2013-07-18 |
Editor/Conference | Kahu Security |
Link | http://www.kahusecurity.com/2013/kore-exploit-kit/ (Archive copy) |
Author | Darryl |
Type | Blogpost |
Abstract
“ Recently, a reader passed on to me a very active TDS link that redirected users to one of four exploit packs. These packs led to some form of ransomware being installed on the victim’s machine. Analysis of these packs have been covered elsewhere but I wanted to document the analysis here in case there are changes. Since there’s a lot to go through, I’ll only cover the important bits.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1354, editor = {Kahu Security}, author = {Darryl}, title = {Kore exploit kit}, date = {18}, month = Jul, year = {2013}, howpublished = {\url{http://www.kahusecurity.com/2013/kore-exploit-kit/}}, }