Skip to Content

Tag: Sundown

Shadow Talk Update – 03.19.2018

This week’s Shadow Talk features the latest techniques in tax return fraud, claimed vulnerabilities in AMD chips, Slingshot malware targeting Mikrotik routers, and Greenflash Sundown Exploit Kit delivering Hermes ransomware.     Slingshot espionage campaign undetected for six years A newly detected cyber espionage campaign used a compromised router as a foothold to drop malicious information-stealing […]

Fluctuation in the Exploit Kit Market – Temporary Blip or Long-Term Trend?

Exploit kit activity is waning. Collectively these malware distribution tools used to be a prominent method of infection. They rely on compromised websites, malicious adverts and social engineering to direct web traffic to their landing pages and attempt the exploitation of vulnerable software. Operated by various actors and groups, exploit kits possess different features, use […]

Sun to Set on BEPS/Sundown Exploit Kit?

On February 13, 2017, the security researcher David Montenegro (@CryptoInsane) posted a series of tweets claiming that the source code for the BEPS exploit kit had been leaked online. Montenegro’s posts were accompanied by screenshots which showed a log file purportedly taken from the dump, which featured references to the actor “Kriminalac” and the Yugoslavian […]

Forecasting the exploit kit landscape

We’ve previously written on the most popular vulnerabilities that exploit kits are using. But how might the exploit kit market develop over the next year? There are five identifiable of factors that may impact the status of the exploit kit marketplace. The resources held by exploit kit developers The amount of custom they received The […]

Understanding Exploit Kits’ Most Popular Vulnerabilities

One significant aspect of mitigating the risk posed by exploit kits is keeping software up-to-date. However, for some organizations, knowing what to patch as a priority can be difficult. Our latest whitepaper helps organizations to understand what vulnerabilities are most frequently targeted and helps them to prioritize their patching processes. In order to assess the […]