Results for "angler"
June 17, 2016 - For those tracking exploit kits, the disappearance of the Angler exploit kit last week was a major event. While a lot of questions remain, several clues pointed out that this was no ordinary break, and that something deeper was likely going on. After about ten days without Angler EK, we take a look at the exploit kit landscape.
June 10, 2016 - In the past week, the Angler EK has almost completely disappeared. Instead, we see Neutrino EK take center stage in various attacks.
Angler was one of the leading exploit kits used by cybercriminals to distribute malware ranging from ransomware and banking Trojans to ad fraud. Like most other exploit kits, it focused on web-based vulnerabilities in the browsers and their plugins. Angler was one of the few exploit kits during its time that offered fileless infections, where malware never touches the disk and only resides in memory to avoid detection. Angler has been inactive since June 2016.
May 11, 2016 - Emol[.]com suffers from malvertising.
May 4, 2016 - A rogue advertiser managed to push the Angler exploit kit to unsuspecting visitors browsing kmov.com, the website for a St Louis-based CBS-affiliated television station.
April 20, 2016 - Websites' third party plugins can be deceiving, especially when they are used to redirect to malware.
March 23, 2016 - We review some changes with a malware campaign known as 'EITest'
March 15, 2016 - MSN, BBC, AOL, NY Times and other large publishers affected by latest Angler malvertising attack.
March 1, 2016 - A white paper collaboration between Malwarebytes and GeoEdge on the latest malvertising techniques.