Attack toolkits are bundles of malicious code tools used to facilitate the launch of concerted and widespread attacks on networked computers. Also known as crimeware, these kits are usually composed of prewritten malicious code for exploiting vulnerabilities along with various tools to customize, deploy, and automate widespread attacks, such as command-and-control (C&C) server administration tools.
As with a majority of malicious code in the threat landscape, attack kits are typically used to enable the theft of sensitive information or to convert compromised computers into a network of zombie bots (botnet) in order to mount additional attacks. These kits are advertised and sold in the online underground economy—a black market of servers and forums used to advertise and trade stolen information and services.
Symantec has found that attack kits are significantly advancing the evolution of cybercrime into a self-sustaining, profitable, and increasingly organized economic model worth millions of dollars.
Download: PDF
Attack Toolkits and Malicious Websites SlideShare
Symantec Attack Kit Evolution Timeline
Volut-ID | World News Articles
All news of interest and can provide an info for you, and so can assist in the search for new news.
About news gadgets, mobile phones
info about the latest mobile phone, from news, features, and the most mobile phone models in search of the world.
Symantec Report on Attack Kits and Malicious Websites
Related Post
Papers
- Securing The Kernel via Static Binary Rewriting and Program Shepherding
- Securing The Kernel via Static Binary Rewriting and Program Shepherding
- 2011 Data Breach Investigations Report
- 2011 Data Breach Investigations Report
- Mozilla Firefox Internals & Attack Strategies
- Mozilla Firefox Internals & Attack Strategies
- Web application vulnerabilities in context of browser extensions
- Web application vulnerabilities in context of browser extensions
- PHP LFI to arbitratry code execution via rfc1867 file upload temporary files
- PHP LFI to arbitratry code execution via rfc1867 file upload temporary files
- Credit Card skimming and PIN harvesting in an EMV world
- Credit Card skimming and PIN harvesting in an EMV world
- Exposing the Lack of Privacy in File Hosting Services
- Exposing the Lack of Privacy in File Hosting Services
- Botnets: Measurement, Detection, Disinfection and Defence
- Botnets: Measurement, Detection, Disinfection and Defence
- Leaking browsing history via user interaction and side channel attacks
- Leaking browsing history via user interaction and side channel attacks
- HTTP Geolocation
- HTTP Geolocation
- HITB Magazine Issue 005 released
- HITB Magazine Issue 005 released
- Symantec Report on Attack Kits and Malicious Websites
- Trustwave's Global Security Report 2011: Web Application Risks
Botnet
- Botnets: Measurement, Detection, Disinfection and Defence
- Botnets: Measurement, Detection, Disinfection and Defence
- Symantec Report on Attack Kits and Malicious Websites
- Smartphone Botnets over SMS Demo
- Smartphone Botnets over SMS Demo
- Researcher will release Smartphone Botnet PoC code at Shmoocon
- Researcher will release Smartphone Botnet PoC code at Shmoocon
- Koobface: Inside a Crimeware Network
- Koobface: Inside a Crimeware Network
- The Botnet Chronicles
- The Botnet Chronicles
- The Zeus malware R&D program
- The Zeus malware R&D program
- Security firm warns of commercial, on-demand DDoS botnet
- Security firm warns of commercial, on-demand DDoS botnet
- Mumba Botnet Disclosed
- Mumba Botnet Disclosed
- Botnet Exploits PDF Flaw
- Botnet Exploits PDF Flaw
- Botnet with integrated copy protection
- Botnet with integrated copy protection
- The Command Structure of the Aurora Botnet
- The Command Structure of the Aurora Botnet
Malware
- YARA v.1.5 released
- YARA v.1.5 released
- Botnets: Measurement, Detection, Disinfection and Defence
- Botnets: Measurement, Detection, Disinfection and Defence
- Symantec Report on Attack Kits and Malicious Websites
- THE CYBER-CRIME BLACK MARKET: UNCOVERED
- THE CYBER-CRIME BLACK MARKET: UNCOVERED
- REMnux v.2.0 Released
- REMnux v.2.0 Released
- PandaLabs Annual Report 2010
- PandaLabs Annual Report 2010
- Zozzle: Low-overhead Mostly Static JavaScript Malware Detection
- Zozzle: Low-overhead Mostly Static JavaScript Malware Detection
- Koobface: Inside a Crimeware Network
- Koobface: Inside a Crimeware Network
- The Zeus malware R&D program
- The Zeus malware R&D program
- Kaspersky download site hacked to spread fake AV
- Kaspersky download site hacked to spread fake AV
- W32.Stuxnet Dossier
- W32.Stuxnet Dossier
- Stuxnet Under the Microscope
- Stuxnet Under the Microscope
- The Rise of PDF Malware
No response to “Symantec Report on Attack Kits and Malicious Websites”
Leave a reply