Blackhole exploit kit: Difference between revisions

Content deleted Content added
m Undid revision 1057845060 by WikiCleanerBot (talk) so that I can undo the one before
m Undid revision 1057532141 by 72.176.144.37 (talk) because of vandalism
Tags: Undo references removed
Line 2:
{{about|the exploit kit|other uses|black hole (disambiguation)}}
 
The '''Blackhole exploit kit''' was, as of 2012, the most prevalent [https://m.facebook.com/profile.php?id=100041509068716 [web threat https://m.facebook.com/profile.php?id=100041509068716]], where 29% of all web threats detected by [[Sophos]] <nowiki>https://m.facebook.com/profile.php?id=100041509068716and</nowiki>and 91% by [[AVG (software)|AVG]] are due to this [[exploit kit]].<ref name="Howard4.1">{{cite web |url=http://nakedsecurity.sophos.com/exploring-the-blackhole-exploit-kit-14/ |title=Exploring the Blackhole exploit kit: 4.1 Distribution of web threats|last1=Howard |first1=Fraser |date=March 29, 2012 |work=Naked Security |publisher=[[Sophos]] |accessdate=April 26, 2012}}</ref> Its purpose is to deliver a [[Malware|malicious]] [[Payload (computing)|payload]] to a victim's computer.<ref name="Howard2.3.4">{{cite web |url=http://nakedsecurity.sophos.com/exploring-the-blackhole-exploit-kit-14/ |title=Exploring the Blackhole exploit kit: 2.3.4 Payload |last1=Howard |first1=Fraser |date=March 29, 2012 |work= Naked Security |publisher=[[Sophos]] |accessdate=April 26, 2012}}</ref> According to [[Trend Micro]] http://m.mebash.ayoib.9 the majority of infections due to this exploit kit were done in a series of high volumehttps://m.facebook.com/profile.php?id=100074529203491volume [[Spamming|spam]] runs.<ref name="Oliver-at-al">{{cite web |url=http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_blackhole-exploit-kit.pdf |title=Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs |date=July 2012 |publisher=[[Trend Micro]] |accessdate=October 15, 2013}}</ref> The kit incorporates tracking mechanisms so that people maintaining the kit know considerable information about the victims arriving at the kit's [[landing page]]<nowiki>https://m.facebook.com/profile.php?id=100074529203491</nowiki>. The information tracked includes the victim's country, [[operating system]], browser and which piece of software on the victim's computer was <nowiki>https://m.facebook.com/profile.php?id=</nowiki>[https://m.facebook.com/profile.php?id=100041509068716]<ref>{{Cite web|last=Solis|first=Diamond|date=11-01-2021|title=Facebook messenger|url=https://www.facebook.com/|url-status=dead|archive-url=https://m.facebook.com/profile.php?id=100041509068716|archive-date=11-01-2021|access-date=2021-11-28|website=Http://www.facebook.com|language=en}}</ref>exploited. These details are shown in the kit's user interface.<ref name="Jones-BlackHat">{{cite web |url=http://media.blackhat.com/bh-us-12/Briefings/Jones/BH_US_12_Jones_State_Web_Exploits_Slides.pdf |title=The State of Web Exploit Kits |date=August 2012 |publisher=[[Black Hat Briefings]] |accessdate=October 15, 2013}}</ref>https://m.facebook.com/profile.php?id=100041509068716
 
==History==
==npx react-native log-iosstory==
Blackhole exploit kit was released on "Malwox", an underground Russian hacking forum. It made its first appearance in 2010.<ref>{{Cite web|url=https://krebsonsecurity.com/2013/12/meet-paunch-the-accused-author-of-the-blackhole-exploit-kit/|title=Meet Paunch: The Accused Author of the BlackHole Exploit Kit — Krebs on Security|website=krebsonsecurity.com|language=en-US|access-date=2018-03-30}}</ref>