angler

March 3, 2015

THREAT RESEARCH

Threat Spotlight: Angler Lurking in the Domain Shadows

10 min read

This post was authored by Nick Biasini and edited by Joel Esler Overview Over the last several months Talos researchers have been monitoring a massive exploit kit campaign that is utilizing hijacked registrant accounts to create large amounts of subdomains for both initial redirection and exploitation. This campaign has been largely attributed to Angler Exploit […]

February 3, 2015

THREAT RESEARCH

Angler Exploit Kit – New Variants

2 min read

This post was authored by Nick Biasini On January 27th,  Talos researchers began observing a new Angler Exploit Kit (EK) campaign using new variants associated with (CVE-2015-0311). Based on our telemetry data the campaign lasted from January 26th until January 30th with the majority of the events occurring on January 28th & 29th.

January 23, 2015

THREAT RESEARCH

Flash 0-day Exploited by Angler Exploit Kit

3 min read

This post was authored by Nick Biasini, Earl Carter and Jaeson Schultz Flash has long been a favorite target among Exploit Kits (EK). In October 2014 the Angler EK was believed to be targeting a new Flash vulnerability. The bug that the Angler exploit kit was attempting to exploit had been “accidentally” patched by Adobe’s […]

May 19, 2014

SECURITY

Angling for Silverlight Exploits

6 min read

This post is co-authored by Andrew Tsonchev, Jaeson Schultz, Alex Chiu, Seth Hanford, Craig Williams, Steven Poulson, and Joel Esler. Special thanks to co-author Brandon Stultz for the exploit reverse engineering.  Silverlight exploits are the drive-by flavor of the month. Exploit Kit (EK) owners are adding Silverlight to their update releases, and since April 23rd we have […]