Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Top 10 Exploit Kits

10.00

Neutrino Exploit Kit

The Neutrino EK, and its predecessor Neutrino-v, are popular exploit kits that surged in mid-2016. They are known for using compromised ...

10.00

RIG Exploit Kit

The RIG EK is spread via suspicious advertisements that have been inserted into legitimate websites. The VIP version of the EK, RIG-v, a ...

9.00

Empire Pack Exploit Kit

The exploit kit, also referred to RIG-E, surfaced in September 2016 and takes advantage of flaws in Microsoft and Adobe software.

10.00

Sundown Exploit Kit

Also referred to as the "Beta Exploit Pack," the Sundown EK is known to distribute remote access Trojans (RATs) via phishing e ...

10.00

Bizarro Sundown Exploit Kit

The EK was first spotted in October of 2016 and is a predecessor of the Sundown EK.

10.00

Magnitude Exploit Kit

Also known as Popads, the Magnitude EK is used in malvertising attacks to infect victims who visit compromised websites.

10.00

Astrum Exploit Kit

The exploit kit, also referred to as Stegano, hides in malicious banner ads.

10.00

Sweet Orange Exploit Kit

The exploit kit spreads various malware via phishing emails which contain malicious links or attachments.

8.50

Sednit Exploit Kit

The exploit kit is a custom kit used by the hacking group "Sednit" and targets flaws in Microsoft Internet Explorer.

10.00

CK Exploit Kit

The exploit kit was first spotted in 2012 and infected users with drive-by-downloads primarily on Chinese and Korean websites.