Advanced Blackhole exploit kit unveiled for Windows 8
The version 2 of Blackhole exploit kit is sharper in its attack against security defenses
Cyber crooks have made their attacks stealthier with the launch of Blackhole 2, a popular and aggressive malware kit known to generate malicious code on legitimate websites. The malware-flinging tool can exploit multiple un-patched vulnerabilities in the user’s browsers, browser plug-ins, software applications or operating systems.
Key features of Blackhole 2
Cyber criminals take the help of Blackhole exploit kit to execute drive-by download attacks. The improved version appears to cause butterflies in the stomach of security solutions providers. Let’s look at some of its key features:
- Support for Windows 8 and mobile devices
- Upgraded user interface so that even less tech-savvy criminals can use it
- Revised licensing structure that focuses more on renting rather than buying the application
Three-step functioning of the Blackhole exploit kit
First Step: To find a popular, legitimate website that can be exploited or compromised to infect with malicious code. The reason behind the selection of legitimate sites as mentioned in the Sophos Security Threat Report 2012 is, “legitimate sites are generally trusted and may be popular, high-traffic venues, they can be very successful for distributing malware to unsuspecting visitors through the browser.”
Second Step: To make attempts and download malware on the PCs of visiting surfers. The Blackhole kit takes advantage of any unlatched Java, browser or Adobe Flash vulnerability for its infiltration into the user’s PC.
Third Step - Final Attack: Infect Windows PCs with a banking Trojan, fake antivirus, or botnet agent.
The rental prices for a Blackhole exploit kit begin from $50/day, whereas taking the software kit on lease for a year costs around $1,500.