Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Angler EK makes it difficult to track down malvertising sources

Angler EK makes it difficult to track down malvertising sources

2015/05/11

Securityweek - (International) A security expert discovered that the Angler Exploit Kit (EK) is leveraging Web browser bugs to break the referrer chain, making it more difficult for security researchers and advertising networks to determine the kit's source in the campaign.

Source: http://www.securityweek.com/angler-ek-makes-it-difficult-track-down-malvertising-sources

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:24:16