{"id":6191,"date":"2012-02-29T13:57:29","date_gmt":"2012-02-29T20:57:29","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=6191"},"modified":"2018-10-05T10:52:17","modified_gmt":"2018-10-05T16:52:17","slug":"blackhole-exploit-kits-gets-updated-with-new-features","status":"publish","type":"post","link":"https://www.webroot.com/blog/2012\/02\/29\/blackhole-exploit-kits-gets-updated-with-new-features\/","title":{"rendered":"BlackHole exploit kits gets updated with new features"},"content":{"rendered":"<p>According to <strong><a href=\"http:\/\/xylibox.blogspot.com\/2012\/02\/blackhole-v122.html\">independent sources<\/a><\/strong>, the author of the <strong><a href=\"http:\/\/blog.webroot.com\/2012\/01\/25\/researchers-intercept-a-client-side-exploits-serving-malware-campaign\/\">most popular web malware exploitation kit<\/a><\/strong> currently dominating the <strong><a href=\"http:\/\/blog.webroot.com\/2012\/02\/08\/researchers-intercept-two-client-side-exploits-serving-malware-campaigns\/\">threat landscape<\/a><\/strong>, has recently issued yet another update to the latest version of the kit\u00a0v1.2.2.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/02\/blackhole_exploit_kit.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-6192\" title=\"BlackHole_exploit_kit\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/02\/blackhole_exploit_kit.png\" alt=\"\" width=\"400\" height=\"154\" \/><\/a><\/p>\n<p>More details:<\/p>\n<p><!--more-->According to the independent reports, here&#8217;s what the latest update has introduced in the BlackHole exploit kit:<\/p>\n<ul>\n<li>Java OBE + Java Rhino is now in a obedeny exploit Java Pack<\/li>\n<li>Significantly improved otstuk through the Java hook<\/li>\n<li>Your files are protected from AV companies pumping<\/li>\n<li>Internal optimization of exploits<\/li>\n<\/ul>\n<p>This is the second update issued for the exploit kit in recent months, following <strong><a href=\"http:\/\/www.zdnet.com\/blog\/security\/web-malware-exploitation-kits-updated-with-new-java-exploit\/9849\">December 2011&#8217;s introduction of the\u00a0CVE-2011-3544<\/a><\/strong> exploit in the kit.<\/p>\n<p>The BlackHole web malware exploitation kits is currently <strong><a href=\"http:\/\/www.zdnet.com\/blog\/security\/which-are-the-most-commonly-observed-web-exploits-in-the-wild\/10261?tag=search-results-rivers;item8\">the most observed exploit kit currently used by cybercriminals<\/a><\/strong>, mostly due to the constant updates issued for the kit.<\/p>\n<p>End users are advised to ensure that they&#8217;re not surfing the Web using <strong><a href=\"http:\/\/secunia.com\/vulnerability_scanning\/personal\/\">outdated third-party applications<\/a><\/strong>, and <strong><a href=\"http:\/\/www.mozilla.org\/en-US\/plugincheck\/\">browser plugin<\/a><\/strong>s.<\/p>\n<p>Webroot security researchers will continue monitoring the latest developments around the BlackHole exploit kit to ensure that <strong><a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\">Webroot SecureAnywhere<\/a><\/strong> customers are protected from this threat.<\/p>\n<p><em>You can find more about Dancho Danchev at his\u00a0<strong><a href=\"http:\/\/nl.linkedin.com\/in\/danchodanchev\">LinkedIn Profile<\/a><\/strong>. You can also\u00a0<strong><a href=\"http:\/\/www.twitter.com\/danchodanchev\">follow him on \u00a0Twitter<\/a><\/strong>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to independent sources, the author of the most popular web malware exploitation kit currently dominating the threat landscape, has recently issued yet another update to the latest version of the kit\u00a0v1.2.2. More details:<\/p>\n","protected":false},"author":65,"featured_media":17048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[5037,9173,9167,9211,4911,10259,10257,10255,4559,10253,10261,3477,9575,3625,3569,4981,4313,9493,9559,3525],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/6191"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=6191"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/6191\/revisions"}],"predecessor-version":[{"id":25303,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/6191\/revisions\/25303"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17048"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=6191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=6191"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=6191"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=6191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}