Technical paper: Deeper inside the Blackhole exploit kit

Filed Under: Featured, Malware, SophosLabs, Vulnerability

Paper hole. Image from ShutterstockReaders following the developments of Blackhole, the most prolific exploit kit throughout 2012, will be interested in the second and concluding part of the technical paper which is now published.

In part one, SophosLabs expert Gabor Szappanos took us through the server-side code, providing a general understanding of how the Blackhole exploit kit operates.

In this latest paper, he takes a deeper look at the server-side operation of the kit, including details of the functions used in targeting client-side exploits.

The paper also includes some excellent data on the top payloads being served-up by the Blackhole exploit kit during the period of research.

Blackhole payload breakdown

I would urge interested readers to take a look through the concluding part of this technical research - it's an ideal way to equip yourselves with an understanding of how such kits are being used to infect users with malware.

Read now: "Inside a Black Hole - Part 2"

Torn paper hole image from Shutterstock.

, , ,

You might like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

About the author

Fraser is one of the Principal Virus Researchers in SophosLabs. He has been working for Sophos since 2006, and his main interest is in web related threats.