How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Posts Tagged ‘Angler Exploit Kit’
Most Recent
Read More
December 11, 2015

Malicious Attackers Add Malware to Guardian’s Cybercrime Article

If anything, this particular revelation shows the dark sense of warped humor by malware peddlers and cybercriminals on the internet.

The Guardian, a prominent UK publication had published an article which headlined “Cybercrime: Is it out of Control?” that claimed cybercriminals getting more audacious over time. Sure enough, cybercriminals audaciously injected a malicious URL into the syndicated links embedment on the page that redirected users to the dreaded Angler Exploit Kit malware.

The discovery of the malware was made by security researchers J.Gomez, Kenneth Hsu and Kenneth Johnson at security firm FireEye on December 1, 2015.

Read More
December 2, 2015

New Drive-By Allows Exploit to Plug Dreaded Ransomware Cryptowall 4.0

A new series of drive-by campaigns that are equipped to spread the Angler exploit kit to subsequently shove the most infamous ransomware of them all, Cryptowall, has been discovered.

A team of security researchers at Heimdal Security have uncovered a new batch of malicious drive-by campaigns. The new strain spreads the Angler exploit kit by injecting malicious code into targeted web pages.  The researchers note the destructive potential of the campaigns due to the malware authors’ comprehensive objectives and the attack mechanisms used.

The complete account of the malware discovery can be found here.

If the campaign is effective, the [...]

Read More
October 19, 2015

Shady SEO Campaign Spews Malware via a Google Search

A team of security researchers have uncovered a malicious SEO campaign that targets unsuspecting users through compromised URLs via script injections.

A malware-laced SEO campaign has infected popular keyword searches on Google such as Java JRE, Windows 8 and MSN to affect hundreds of thousands of searches that routinely occur every month. The discovery was one by the security team at Heimdal who uncovered the campaign containing “compromised web pages and dozens of script injections.”

The blog post detailing the observation can be found here.

An unsuspecting user would simply have to search with a targeted keyword and visit the faux web page while looking for [...]

Read More
October 7, 2015

Cisco Talos Thwarts Massive Ransomware Campaign Netting $30M+ Annually

Cisco Talos managed to disrupt a major ransomware campaign that researchers believe netted a hacker more than $30 million per year. The team determined that the Angler Exploit Kit used proxy servers of service provider Limestone Networks with the primary threat actor responsible for up to 50 percent of Angler Exploit Kit activity, according to a report on the Talos website. The attackers targeted as many as 90,000 victims per day.

Talos gained visibility into the network’s global activity through a collaboration with Level 3 Threat Research Labs. Thanks to this collaboration, the researchers were able to gain visibility into the attackers’ domain activity, Talos [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University