A report from security firm Sophos has concluded that the infamous Blackhole malware exploit kit originated in Russia.
Researcher Gabor Szappanos said in a teardown report on the Blackhole source code that a number of clues point towards Russia as the cradle of the wildly popular exploit kit which allows attackers to automatically target flaws for malware installations.
According to Szappanos, the developers of Blackhole left several key pieces of information available in the source code which suggest their location. Among the clues was the setting of Moscow as the default time zone location and the preference of Russian as the default interface language.
Other clues include the use of date formats unique to Eastern Europe and the presence of Cyrillic character encoding.
"All the evidence supports the assumption that the development of the Blackhole exploit kit occurred in Russia," Szappanos said.
The discovery of Blackhole's origin could prove useful for security researchers and law enforcement groups who are trying to stop the spread of Blackhole and apprehend the developers behind it.
The Blackhole kit has grown in recent years to become the most popular exploit kit on the internet. Researcher estimate that various builds of Blackhole are responsible for as much as one third of all drive-by malware attacks.
While the most recent versions of Blackhole can cost hundreds to thousands of dollars to purchase and maintain, older versions of the platform can be found for free on various cybercrime sites.
Recently, the platform showed signs of spreading as researchers uncovered 'Cool,' an attack toolkit which appears to be derived from Blackhole.
Small Texas cable firm alleges foul play
Facebook will join fores with UK NGOs to tackle hate speech on the social network
A survey of local authorities has found that they face challenges in the areas of data, compliance and mobility.
More than 800,000 home users could be affected