Exploring the Blackhole exploit kit

Blackhole, courtesy of ShutterstockAuthor:

Fraser Howard
SophosLabs, UK
fraser.howard@sophos.com

Read the paper in pdf format, or view the online version.


Contents

  1. Introduction
  2. Blackhole exploit kit
  3. Code obfuscation
  4. Tracking Blackhole
  5. Discussion and conclusions
  6. Appendices