Exploits kit have become increasingly sophisticated throughout the years. Where obfuscation and new zero days were once the only additions in the development cycle, evasive code is now being embedded into the framework and shellcode.Read more...
Entries filed under 'Exploit Kits'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
April 7, 2016 8:30 AM By Genwei Jiang | Exploits
An in-the-wild exploit kit, Magnitude EK, was exploiting a previously unknown vulnerability in Adobe Flash Player and achieving remote code execution on recent versions of Flash Player. Thanks to Adobe's new exploit mitigations, it's now failing.Read more...
March 18, 2016 8:30 AM By Kenneth Johnson , J. Gomez | Exploits
Visitors to a Korean news site are being redirected to the GongDa Exploit Kit, which we believe has its origins in China. The EK can compromise vulnerable endpoints, allowing harmful malware to be installed.
December 9, 2015 12:00 PM By J. Gomez, Kenneth Hsu, Kenneth Johnson | Exploits
Users who clicked on a URL on the website theguardian[.]com to read an article on cybercrime were silently redirected to the Angler Exploit Kit.
April 1, 2015 4:17 PM By Nart Villeneuve, Joshua Homan | Exploits