Get a Pentest and security assessment of your IT network.

News

EXPLOIT-KIT Java User-Agent downloading Portable Executable – Possible Exploit Kit

In our most recent rule pack, amongst the 39 new rules were two very important rules that may require a bit of analyst work when you see them alert. The rules look for a Java User-Agent outbound from your network in the User-agent string of the http header. In fact, we’ve had these rules in our test systems for about a month and we’ve seen zero false positives. While it may be an extra layer of protection to write rules that look for these known bad files in the blackholev2 exploit kit, the way I wrote 25041 and 25042 will catch much more.”]

Source: https://blog.talosintelligence.com/2012/12/exploit-kit-java-user-agent-downloading.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months