Freebie Blackhole exploit kit appears on file-sharing websit

For discussions about security.
Post Reply
Message
Author
User avatar
Flash
Official Dog Handler
Posts: 13071
Joined: Wed 04 May 2005, 16:04
Location: Arizona USA

Freebie Blackhole exploit kit appears on file-sharing websit

#1 Post by Flash »

http://www.theregister.co.uk/2011/05/24 ... t_freebie/
A free version of the Blackhole exploit kit has appeared online in a development that radically reduces the entry-level costs of getting into cybercrime.

The Blackhole exploit kit, which up until now would cost around $1,500 for an annual licence, creates a handy way to plant malicious scripts on compromised websites. Surfers visiting legitimate sites can be redirected using these scripts to scareware portals on sites designed to exploit browser vulnerabilities in order to distribute banking Trojans, such as those created from the ZeuS toolkit.

The wider availability of Blackhole comes only days after the source code of ZeuS appeared online, collectively creating what one researcher described as an arms bazaar for cyber crooks.

"If the ZeuS leak was like giving a machine gun away for free, giving away exploit kits is like providing the ammo," said Aviv Raff, CTO at security tools firm Seculert.

Earlier versions of the Blackhole exploit kit are available at no charge through file-sharing websites, but omit features that are found in the latest versions of the tool. For example, the leaked copies leave out the features that allow crooks to redirect surfers arriving at a compromised domain to different sites, depending on the operating system they are running, Threatpost reports.

The Blackhole Exploit kit featured in the tainted ads served through ad-supported versions of Spotify last month and a separate drive-by download attack involving the US Postal Service website, among others.

Bruce B

Re: Freebie Blackhole exploit kit appears on file-sharing websit

#2 Post by Bruce B »

Flash wrote:
The Blackhole Exploit kit featured in the tainted ads served through ad-supported versions of Spotify last month and a separate drive-by download attack involving the US Postal Service website, among others.
I don't use Facebook. This doesn't mean it doesn't use us. Specifically, they have positioned themselves to track us across multiple domains.

The pic below is a partial screen of a Spotify page. The grey area is where Facebook wants to do something. Except I have it configured that Puppy's Hiawatha server displays the blocked frame in grey.

Here is a list of my unwanted facebook domain names

127.0.0.1 api.ak.facebook.com
127.0.0.1 api.connect.facebook.com
127.0.0.1 api.facebook.com
127.0.0.1 connect.facebook.net
127.0.0.1 facebook.com
127.0.0.1 graph.facebook.com
127.0.0.1 static.ak.connect.facebook.com
127.0.0.1 www.connect.facebook.com
127.0.0.1 www.facebook.com

~
Attachments
blocked-frame.jpg
(37.12 KiB) Downloaded 423 times

Post Reply