Neosploit gets Java 0-Day
Jump to navigation
Jump to search
(Publication) Google search: [1]
Neosploit gets Java 0-Day | |
---|---|
Botnet | |
Malware | |
Botnet/malware group | |
Exploit kits | NeoSploit |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-09-01 |
Editor/Conference | Kahu Security |
Link | http://www.kahusecurity.com/2012/neosploit-gets-java-0-day/ (Archive copy) |
Author | darryl |
Type |
Abstract
“ Neosploit has been popping up every once and awhile, quietly infecting users without a whole lot of attention. This past week, its author(s) decided to update Neosploit with the latest Java exploit. It now joins the likes of Blackhole and “RedKit” which have also been updated.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1175, editor = {Kahu Security}, author = {darryl}, title = {Neosploit gets Java 0-Day}, date = {01}, month = Sep, year = {2012}, howpublished = {\url{http://www.kahusecurity.com/2012/neosploit-gets-java-0-day/}}, }