Get a Pentest and security assessment of your IT network.

News

A look back at the Zyns iframer campaign

Drive-by download attacks have been going on since at least 2014. Campaigns are an essential part of the underground ecosystem because they feed potential new victims into the infection funnel which ultimately translates into revenues for online criminals. During its course, we noted several different exploit kits being pushed by this campaign. The redirection infrastructure had very distinct patterns and shared many of the same server IP addresses over time. We also saw the evolution from dynamic DNS (via sub domains) to domains on dubious top-level domains (TLDs)”]

Source: https://blog.malwarebytes.com/threat-analysis/2017/01/a-look-back-at-the-zyns-iframer-campaign/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months