Results for "angler"

June 17, 2016 - For those tracking exploit kits, the disappearance of the Angler exploit kit last week was a major event. While a lot of questions remain, several clues pointed out that this was no ordinary break, and that something deeper was likely going on. After about ten days without Angler EK, we take a look at the exploit kit landscape.

CONTINUE READING No Comments

June 10, 2016 - In the past week, the Angler EK has almost completely disappeared. Instead, we see Neutrino EK take center stage in various attacks.

CONTINUE READING No Comments

Angler

Angler was one of the leading exploit kits used by cybercriminals to distribute malware ranging from ransomware and banking Trojans to ad fraud. Like most other exploit kits, it focused on web-based vulnerabilities in the browsers and their plugins. Angler was one of the few exploit kits during its time that offered fileless infections, where malware never touches the disk and only resides in memory to avoid detection.  Angler has been inactive since June 2016.

CONTINUE READING No Comments

May 11, 2016 - Emol[.]com suffers from malvertising.

CONTINUE READING 1 Comment

May 4, 2016 - A rogue advertiser managed to push the Angler exploit kit to unsuspecting visitors browsing kmov.com, the website for a St Louis-based CBS-affiliated television station.

CONTINUE READING No Comments

April 20, 2016 - Websites' third party plugins can be deceiving, especially when they are used to redirect to malware.

CONTINUE READING No Comments

March 23, 2016 - We review some changes with a malware campaign known as 'EITest'

CONTINUE READING No Comments

March 15, 2016 - MSN, BBC, AOL, NY Times and other large publishers affected by latest Angler malvertising attack.

CONTINUE READING 19 Comments

March 1, 2016 - A white paper collaboration between Malwarebytes and GeoEdge on the latest malvertising techniques.

CONTINUE READING No Comments

Select your language