
Oops, they keep doing it, again and again - trying to cash-in on the biased exclusiveness of web malware exploitation kits in general, which when combined with active branding is supposed to make them rich. However, despite the low price of $300 in this particular case, this copycat kit is once again lacking any signification differentiation factors besides perhaps the 20+ exploits targeting Opera and Internet Explorer included within.

Marketed for novice users, despite lacking any key features worth being worried about, it's still managing to maintain a steady infection rate of unpatched Opera browsers. Such statistics obtained in an OSINT fashion always provide a realistic perspective on publicly known facts, like the one where millions of end users continue getting exploited due to their overall misunderstanding of today's threatscape driven by the ubiquitous web exploitation kits.
Related posts:
Modified Zeus Crimeware Kit Gets a Performance Boost Zeus Crimeware Kit Gets a Carding LayoutWeb Based Malware Emphasizes on Anti-Debugging FeaturesCopycat Web Malware Exploitation Kit Comes with DisclaimerWeb Based Malware Eradicates Rootkits and Competing MalwareTwo Copycat Web Malware Exploitation Kits in the WildCopycat Web Malware Exploitation Kits are FaddishWeb Based Botnet Command and Control Kit 2.0 BlackEnergy DDoS Bot Web BasedA New DDoS Malware Kit in the WildThe Small Pack Web Malware Exploitation KitThe Nuclear Grabber KitThe Apophis KitNuclear Malware KitThe Random JS Malware Exploitation KitMetaphisher Malware Kit Spotted in the Wild
No comments:
Post a Comment