FireEye researchers showcase some of the prominent malvertising campaigns active over the last four months, as well as the cushion servers related to different exploit kits.Read more...
Entries filed under 'Exploit Kits'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
July 14, 2016 4:37 PM By Kenneth Johnson , Yasir Khalid, Dan Caselden, Sai Omkar Vashisht | Exploits
The Neutrino EK adopted an open-source exploit and now uses it to embed multiple exploits into a SWF file.
June 6, 2016 8:00 AM By Raghav Pande, Amit Malik | Exploits
Exploits kit have become increasingly sophisticated throughout the years. Where obfuscation and new zero days were once the only additions in the development cycle, evasive code is now being embedded into the framework and shellcode.Read more...
April 7, 2016 8:30 AM By Genwei Jiang | Exploits
An in-the-wild exploit kit, Magnitude EK, was exploiting a previously unknown vulnerability in Adobe Flash Player and achieving remote code execution on recent versions of Flash Player. Thanks to Adobe's new exploit mitigations, it's now failing.Read more...
March 18, 2016 8:30 AM By Kenneth Johnson , J. Gomez | Exploits
Visitors to a Korean news site are being redirected to the GongDa Exploit Kit, which we believe has its origins in China. The EK can compromise vulnerable endpoints, allowing harmful malware to be installed.