Inscrivez-vous maintenant pour un meilleur devis personnalisé!

Angler Catches Victims Using Phish as Bait

May, 03, 2016 Hi-network.com

This post authored by Nick Biasini with contributions from Erick Galinkin.

Exploit kits have been a recurring threat that we've discussed here on this blog as a method of driving users to maliciousness.  Users typically encounter exploit kit landing pages through  compromised websites and malvertising. However, we've found a new email twist to the standard procedures associated with getting users into the exploit kit infection chain.

Usually when we see compromised websites serving exploit kit gates there are malicious iframes dropped on single pages or throughout the entire site. These iframes can either be links to an exploit kit landing page directly or to a gate. Using a gate allows the adversary to change the location of the landing page without having to change the compromised wordpress site. In the spam campaign that we detected and blocked, adversaries were instead linking users to "hidden" web pages (pages located within the site's directory structure) on these sites instead of linking users to pages containing an iframe.

 

Read More >>


tag-icon Tags chauds: Threat Research spam angler exploit kits

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.