• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   blackhole exploit kit

Nuclear Exploit Kit Evolves, Includes Silverlight Exploit

  • Posted on:September 23, 2014 at 2:10 am
  • Posted in:Exploits, Vulnerabilities
  • Author:
    Brooks Li (Threats Analyst)
3

Exploit kits have long been part of a cybercriminal’s arsenal. One of the most notorious exploit kits in recent years is the Blackhole Exploit Kit. Coverage over this particular exploit kit reached a fevered pitch with the arrest of its author in 2013. The Blackhole Exploit Kit may have met its demise, but this hasn’t…

Read More
Tags: BHEKblackhole exploit kitExploitsnuclear exploit kitSilverlightVulnerabilities

2013 Security Roundup: Cashing In On Digital Information

  • Posted on:February 11, 2014 at 7:27 am
  • Posted in:Bad Sites, Exploits, Malware, Mobile, Social, Spam, Targeted Attacks
  • Author:
    Trend Micro
0

2013 was another year marked by many changes – for good and bad – in the threat landscape. Some threats waned, others grew significantly, while completely new threats emerged and made life difficult for users. What remained constant, however, were the threats against the safety of digital information. In this entry, we present some of…

Read More
Tags: BHEKblackhole exploit kitcryptolockercybercrimedata securitymobile threatstargeted attacks

A Year of Spam: The Notable Trends of 2013

  • Posted on:January 7, 2014 at 1:38 am
  • Posted in:Exploits, Malware, Spam
  • Author:
    Merianne Polintan (Anti-spam Research Engineer)
0

2013 was a year of change in the spam landscape. The volume of spam increased from 2012. We witnessed the decline of a previously-successful exploit kit. The old became new again, thanks to different techniques used by spammers. While we still saw traditional types of spam, we also saw several “improvements” which allowed spammers to…

Read More
Tags: blackhole exploit kitMalwareSpamspam roundupUPATREZBOT

Unusual BHEK-Like Spam With Attachment Found

  • Posted on:November 13, 2013 at 7:57 pm
  • Posted in:Malware, Spam
  • Author:
    Jonathan Leopando (Technical Communications)
0

Soon after Paunch was arrested, we found that the flow of spam campaigns going to sites with the Blackhole Exploit Kit (BHEK) had slowed down considerably. Instead, we saw an increase in messages with a malicious attachment. Recently, however, we came across rather unusual spam samples that combines characteristics of both attacks. Figure 1. Spammed…

Read More
Tags: BHEKblackhole exploit kitcryptolockerMalwareSpamUPATRE

CryptoLocker Emergence Connected to Blackhole Exploit Kit Arrest

  • Posted on:November 8, 2013 at 9:32 am
  • Posted in:Malware, Spam
  • Author:
    Maria Manly (Anti-spam Research Engineer)
0

The past few weeks have seen the ransomware CryptoLocker emerge as a significant threat for many users. Our monitoring of this threat has revealed details on how it spreads, specifically its connection to spam and ZeuS. However, it looks there is more to the emergence of this thread than initially discovered. We have identified one…

Read More
Tags: BHEKblackhole exploit kitbotnetcryptolockercutwailransomwareSpam
Page 1 of 3123

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.