Shedding light on the NeoSploit Exploit Kit
Jump to navigation
Jump to search
(Publication) Google search: [1]
Shedding light on the NeoSploit Exploit Kit | |
---|---|
Botnet | |
Malware | |
Botnet/malware group | |
Exploit kits | NeoSploit, MPack |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2011 / January 4th, 2011 |
Editor/Conference | M86SecurityLabs |
Link | http://labs.m86security.com/2011/01/shedding-light-on-the-neosploit-exploit-kit/ (Archive copy) |
Author | Daniel Chechik |
Type |
Abstract
“ Over the last few years, we’ve witnessed dozens of Exploit Kits such as the Phoenix Exploit Kit, Eleonore Exploit Kit, Yes Exploit Kit and even some old Exploit Kits such as IcePack and MPack. We’ve observed that most of Exploit Kits don’t last more than one year, except for one…
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2011BFR1173, editor = {M86SecurityLabs}, author = {Daniel Chechik}, title = {Shedding light on the NeoSploit Exploit Kit}, date = {04}, month = Jan, year = {2011}, howpublished = {\url{http://labs.m86security.com/2011/01/shedding-light-on-the-neosploit-exploit-kit/}}, }