Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Angler Exploit Kit now relies on more successful infection tactics

Angler Exploit Kit now relies on more successful infection tactics

2015/04/06

Softpedia - (International) ) Security researchers from Zscaler's Threat Lab identified an evolution in the Angler Exploit Kit (EK) in which attackers are utilizing 302 Cushioning and domain shadowing as infection vectors, in addition to typical malvertising that targets users with outdated browser plug-ins. Researchers believe that the malware dropped by Angler EK in recent attacks was a Carberp family banking trojan.

Source: http://news.softpedia.com/news/Angler-Exploit-Kit-Now-Relies-on-More-Successful-Infection-Tactics-477736.shtml

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:23:57