Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Blackhole exploit kit

From Wikipedia, the free encyclopedia
Malware toolkit
This article is about the exploit kit. For other uses, seeblack hole (disambiguation).

TheBlackhole exploit kit was, as of 2012, the most prevalentweb threat, where 29% of all web threats detected bySophos and 91% byAVG are due to thisexploit kit.[1] Its purpose is to deliver amaliciouspayload to a victim's computer.[2] According toTrend Micro the majority of infections due to this exploit kit were done in a series of high volumespam runs.[3] The kit incorporates tracking mechanisms so that people maintaining the kit know considerable information about the victims arriving at the kit'slanding page. The information tracked includes the victim's country,operating system, browser and which piece of software on the victim's computer was exploited. These details are shown in the kit's user interface.[4]

History

[edit]

Blackhole exploit kit was released on "Malwox", an underground Russian hacking forum. It made its first appearance in 2010.[5]

The supposedly Russian creators use the names "HodLuM" and "Paunch". It was reported on October 7, 2013 that "Paunch" had been arrested.[6]

Dmitry "Paunch" Fedotov was sentenced to seven years in a Russian penal colony on April 12, 2016.[7]

Function

[edit]
  1. The customer licenses the Blackhole exploit kit from the authors and specifies various options to customize the kit.
  2. A potential victim loads a compromised web page or opens a malicious link in a spammed email.
  3. The compromised web page or malicious link in the spammed email sends the user to a Blackhole exploit kit server's landing page.
  4. This landing page contains obfuscatedJavaScript that determines what is on the victim's computers and loads all exploits to which this computer is vulnerable and sometimes aJavaapplet tag that loads a Java Trojan horse.
  5. If there is an exploit that is usable, the exploit loads and executes a payload on the victim's computer and informs the Blackhole exploit kit server which exploit was used to load the payload.

Defenses

[edit]
This sectioncontainsinstructions or advice. Wikipedia is not a guidebook; please helprewrite such content to be encyclopedic or move it toWikiversity,Wikibooks, orWikivoyage.(May 2025)

A typical defensive posture against this and other advanced malware includes, at a minimum, each of the following:

  • Ensuring that the browser, browser's plugins, and operating system are up to date. The Blackhole exploit kit targets vulnerabilities in old versions of browsers such asFirefox,Google Chrome,Internet Explorer andSafari as well as many popular plugins such asAdobe Flash,Adobe Acrobat andJava.
  • Running a security utility with a good antivirusand goodhost-based intrusion prevention system (HIPS). Due to thepolymorphic code used in generating variants of the Blackhole exploit kit, antivirus signatures will lag behind the automated generation of new variants of the Blackhole exploit kit, while changing the algorithm used to load malware onto victims' computers takes more effort from the developers of this exploit kit. A good HIPS will defend against new variants of the Blackhole exploit kit that use previously known algorithms.

See also

[edit]

References

[edit]
  1. ^Howard, Fraser (March 29, 2012)."Exploring the Blackhole exploit kit: 4.1 Distribution of web threats".Naked Security.Sophos. Archived fromthe original on May 2, 2012. RetrievedApril 26, 2012.
  2. ^Howard, Fraser (March 29, 2012)."Exploring the Blackhole exploit kit: 2.3.4 Payload".Naked Security.Sophos. Archived fromthe original on May 2, 2012. RetrievedApril 26, 2012.
  3. ^"Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs"(PDF).Trend Micro. July 2012. RetrievedOctober 15, 2013.
  4. ^"The State of Web Exploit Kits"(PDF).Black Hat Briefings. August 2012. RetrievedOctober 15, 2013.
  5. ^"Meet Paunch: The Accused Author of the BlackHole Exploit Kit — Krebs on Security".krebsonsecurity.com. 6 December 2013. Retrieved2018-03-30.
  6. ^"Blackhole Exploit Kit Author "Paunch" Arrested". Security Week. October 8, 2013. RetrievedOctober 15, 2013.
  7. ^Krebs, Brian (April 14, 2016)."'Blackhole' Exploit Kit Author Gets 7 Years". Krebs on Security. RetrievedApril 20, 2016.


Stub icon

Thismalware-related article is astub. You can help Wikipedia byadding missing information.

Retrieved from "https://en.wikipedia.org/w/index.php?title=Blackhole_exploit_kit&oldid=1321267437"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp