Kore exploit kit

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

Kore exploit kit
Botnet
Malware
Botnet/malware group
Exploit kits Kore
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2013 / 2013-07-18
Editor/Conference Kahu Security
Link http://www.kahusecurity.com/2013/kore-exploit-kit/ (Archive copy)
Author Darryl
Type Blogpost

Abstract

Recently, a reader passed on to me a very active TDS link that redirected users to one of four exploit packs. These packs led to some form of ransomware being installed on the victim’s machine. Analysis of these packs have been covered elsewhere but I wanted to document the analysis here in case there are changes. Since there’s a lot to go through, I’ll only cover the important bits.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1354,
   editor = {Kahu Security},
   author = {Darryl},
   title = {Kore exploit kit},
   date = {18},
   month = Jul,
   year = {2013},
   howpublished = {\url{http://www.kahusecurity.com/2013/kore-exploit-kit/}},
 }