The Neutrino EK, and its predecessor Neutrino-v, are popular exploit kits that surged in mid-2016. They are known for using compromised ...
The RIG EK is spread via suspicious advertisements that have been inserted into legitimate websites. The VIP version of the EK, RIG-v, a ...
The exploit kit, also referred to RIG-E, surfaced in September 2016 and takes advantage of flaws in Microsoft and Adobe software.
Also referred to as the "Beta Exploit Pack," the Sundown EK is known to distribute remote access Trojans (RATs) via phishing e ...
The EK was first spotted in October of 2016 and is a predecessor of the Sundown EK.
Also known as Popads, the Magnitude EK is used in malvertising attacks to infect victims who visit compromised websites.
The exploit kit, also referred to as Stegano, hides in malicious banner ads.
The exploit kit spreads various malware via phishing emails which contain malicious links or attachments.
The exploit kit is a custom kit used by the hacking group "Sednit" and targets flaws in Microsoft Internet Explorer.
The exploit kit was first spotted in 2012 and infected users with drive-by-downloads primarily on Chinese and Korean websites.