FireEye researchers showcase some of the prominent malvertising campaigns active over the last four months, as well as the cushion servers related to different exploit kits.Read more...
Entries filed under 'Exploit Kits'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
July 14, 2016 4:37 PM By Kenneth Johnson , Dan Caselden, Sai Omkar Vashisht, Yasir Khalid | Exploits, Threat Research
The Neutrino EK adopted an open-source exploit and now uses it to embed multiple exploits into a SWF file.
June 6, 2016 8:00 AM By Raghav Pande, Amit Malik | Exploits, Threat Research
Exploits kit have become increasingly sophisticated throughout the years. Where obfuscation and new zero days were once the only additions in the development cycle, evasive code is now being embedded into the framework and shellcode.Read more...
April 7, 2016 8:30 AM By Genwei Jiang | Exploits, Threat Research
An in-the-wild exploit kit, Magnitude EK, was exploiting a previously unknown vulnerability in Adobe Flash Player and achieving remote code execution on recent versions of Flash Player. Thanks to Adobe's new exploit mitigations, it's now failing.Read more...
March 18, 2016 8:30 AM By Kenneth Johnson , J. Gomez | Exploits, Threat Research
Visitors to a Korean news site are being redirected to the GongDa Exploit Kit, which we believe has its origins in China. The EK can compromise vulnerable endpoints, allowing harmful malware to be installed.