Neosploit gets Java 0-Day

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

Neosploit gets Java 0-Day
Botnet
Malware
Botnet/malware group
Exploit kits NeoSploit
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 2012-09-01
Editor/Conference Kahu Security
Link http://www.kahusecurity.com/2012/neosploit-gets-java-0-day/ (Archive copy)
Author darryl
Type

Abstract

Neosploit has been popping up every once and awhile, quietly infecting users without a whole lot of attention. This past week, its author(s) decided to update Neosploit with the latest Java exploit. It now joins the likes of Blackhole and “RedKit” which have also been updated.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1175,
   editor = {Kahu Security},
   author = {darryl},
   title = {Neosploit gets Java 0-Day},
   date = {01},
   month = Sep,
   year = {2012},
   howpublished = {\url{http://www.kahusecurity.com/2012/neosploit-gets-java-0-day/}},
 }