• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Upcoming events
      event logo
      Big Data Virtual Summit

      The Big Data Virtual Summit will comprise expert keynotes, real world case studies and interactive discussion panels led by senior IT practitioners who will share their tips for Big Data technologies and data management strategies.

      • Date: 19 Oct 2016
      • Online
      View all events
      Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3-resources-120x194
      Leveraging data for small businesses

      The most successful businesses are those with confidence in their ability to store, access and use data effectively.  Rather than focusing on the nuts and bolts of storage, this view point looks at the data it holds and more importantly, what can be done with it.

      Download
      V3-resources-120x194
      Getting the SMB network just right

      This review looks at why small businesses need to stop being complacent about their networks and at what they can do to maintain their competitive edge as they follow the big boys down the route of increasing collaboration and other bandwidth-hungry applications likely to impact on network performance and availability.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • SMB Spotlight
  • Sign in
  •  
    •  

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      Forgot your password?
     
     
      • Saved articles
      • Newsletters
      • Apps
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
    • Apps
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    Forgot your password?
 
 
    • Saved articles
    • Newsletters
    • Apps
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

Hackers going Nuclear following Blackhole takedown

Researchers report alarming increase in exploit kit use

mushroom cloud
Nuclear Exploit Kit use skyrockets
  • Alastair Stevenson
  • Alastair Stevenson
  • @MonkeyGuru
  • 09 September 2014
  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
0 Comments

Hackers are leveraging the Nuclear exploit to launch a fresh wave of attacks using compromised webpages on a number of popular websites, including Facebook, according to researchers at Zscaler.

Zscaler ThreatLabz researcher Rubin Azad reported uncovering the campaign in a blog post, claiming the firm spotted the trend after detecting an alarming spike in exploitation attempts on its customers.

"We have seen an increasing number of compromised sites and scam pages leading to Nuclear Exploit Kit [EK] in past three months," he said.

"Some of the notable compromised sites during this timeframe that were redirecting to Nuclear EK includes: SocialBlade.com – a YouTube statistics tracking site – AskMen.com [and] Facebook.com [via] survey scam pages."

Azad told V3 the attacks attempt to use vulnerabilities in numerous popular programmes to infect victims' systems.

"Nowadays Nuclear EK is picking up the pace in the Exploit Kit market. We see lots of Nuclear EK traffic which gets blocked before our customers get infected," he said.

"This particular exploit kit makes use most of the common file types such as PDF, Flash, Java, Windows executables etc and exploits the end user."

Zscaler director of security research Deepen Desai said the rise in Nuclear exploit is likely a response by the cyber crime community to law enforcement agencies work combating the Blackhole exploit.

Russian police arrested a man, who goes by the name Paunch, believed to be the Blackhole exploit kit's author in October 2013. Security researchers have since reported that use of the Blackhole exploit kit has radically dropped.

Desai said the gap left by Blackhole means Nuclear is now one of the top five most dangerous exploit kits in the wild and called for web users and business to be extra vigilant.

"Nuclear Exploit Kit, in our opinion, is one of the top five most prevalent cyber crime exploit kits in the wild at the moment," he said.

"Zscaler advises users to be extremely vigilant when clicking on URLs in emails from untrusted sources. It is also extremely important to apply latest software security updates when they become available to avert such exploitation attempts."

Blackhole is one of many cyber criminal operations targeted by law enforcement over the last year. The FBI arrested the founder of the Silk Road cyber black market Ross William Ulbricht in October.

  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
  • Topics
  • Security
  • Hacking
  • cyber-crime
  • malware

V3 Latest

Microsoft Windows 10 on a laptop
How to fix the Windows 10 Anniversary Update

Tips to get your PC back in order if the Anniversary Update has created problems

  • Operating Systems
  • 11 August 2016
Android logo
Google fined £5.2m for Android antitrust violations in Russia

Firm has also been ordered to change its agreements with device makers

  • Law
  • 11 August 2016
brexit-shutterstock-417868516
Brexit: Tech sector loses confidence in UK after Leave vote

Survey of techUK members finds despondency among cutting-edge firms

  • Government
  • 11 August 2016
Galaxy Note 5 vs Galaxy Note 7
Galaxy Note 7 vs Galaxy Note 5

How does the new Galaxy Note compare with its predecessor?

  • Mobile Phones
  • 11 August 2016
blog comments powered by Disqus
Back to Top

Most read

Apple acquires Coherent Navigation to bolster Apple Maps
Apple execs admit 'embarrassment' over Maps debacle
Microsoft Windows 10 on a laptop
How to fix the Windows 10 Anniversary Update
credit-card
Oracle hack potentially compromises almost every US credit card
Microsoft Windows XP boxes on the assembly line in 2001
Windows XP: 7 reasons ancient OS refuses to die
Galaxy Note 7 render
Samsung Galaxy Note 7 release date, price, specs and features
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube
  • Apps

© Incisive Business Media Limited

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 9177174 & 9178013

Digital publisher of the year 2010, 2013 & 2016

Digital publisher of the year 2010, 2013 & 2016