Malvertising Campaigns Skirt Ad Blockers, Serve Up Mac Malware
The RIG exploit kit and Safari redirects are both in the adversaries’ bag of tricks. Continue reading Malvertising Campaigns Skirt Ad Blockers, Serve Up Mac Malware
Collaborate Disseminate
The RIG exploit kit and Safari redirects are both in the adversaries’ bag of tricks. Continue reading Malvertising Campaigns Skirt Ad Blockers, Serve Up Mac Malware
A malvertising campaign is redirecting users to the RIG exploit kit for the purpose of loading ERIS ransomware onto vulnerable machines. Over the 5-7 July weekend, security researcher nao_sec discovered a malvertising campaign that was abusing the popc… Continue reading Malvertising Campaign Redirects to RIG Exploit Kit, ERIS Ransomware
GoDaddy worked with researchers to shut down 15,000 domain-shadowing websites tied to bogus affiliate marketing offers promoted via spam campaigns. Continue reading GoDaddy Shutters 14,000 Subdomains Tied to ‘Snake Oil’ Scams
The latest version of the RIG exploit kit, a tool used by cybercriminals to launch large-scale drive-by download attacks, is exploiting an Internet Explorer vulnerability that was patched by Microsoft last month after being found in targeted cyberespi… Continue reading RIG Exploit Kit Starts Using IE Zero-Day Flaw Patched in May
GoDaddy, along with researchers from RSA Security and other companies, shut down tens of thousands of illegal established subdomains tied to the RIG Exploit Kit. Continue reading 40,000 Subdomains Tied to RIG Exploit Kit Shut Down
This URL is quite probably unlike anything you’ve ever seen before and yet still works and redirects to malware.
Categories: Tags: 1760468715EKmalwareRIG EKRIG exploit kitsite hacks |
The post Websites compromised in ‘Decimal IP’ campaign appeared first on Malwarebytes Labs.
Continue reading Websites compromised in ‘Decimal IP’ campaign
Researchers have spotted an increase in CryptoShield ransomware infections coming from the RIG Exploit Kit used by EITest delivery campaigns. Continue reading CryptoShield Infections from RIG EK Picking Up
In a deep analysis of RIG, Cisco Talos team outlined the way the exploit kit combines different web technologies such as DoSWF, JavaScript, Flash and VBscript to obfuscate attacks. Continue reading Inside the RIG Exploit Kit
Cisco Talos identified the Sundown exploit kit as an up-and-coming contender that may soon rival RIG in terms of size and volume. Continue reading Sundown Exploit Kit ‘Larger Threat Than People Realize’
The RIG exploit kit was the most active web attack toolkit in September and the number of new malware variants reached its highest point of the last year.Read More Continue reading Latest Intelligence for September 2016