Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
Crimeware kits are losing market share to the Blackhole exploit kit.
According to AVG, the Blackhole toolkit was the toolkit of choice for cyber criminals in the first quarter of 2012, with its research showing that 70 per cent of attacks were performed by variants of Blackhole on average.
Blackhole's success was due to its sophistication as a polymorphic malware designed to bypass anti-virus systems, according to AVG.
AVG chief technology officer Yuval Ben-Itzhak said the use of Blackhole was consistent into 2012 from 2011 and had been dominant for the past two years.
“The Blackhole team are very accurate to update the kit with the latest exploits to offer malware and encryption and obfuscation to escape anti-virus," Ben-Itzhak said.
He said criminals had supplied the toolkit to users through a successful service model.
“To use it, you subscribe by providing your credentials and install Blackhole on servers, then you infect users who visit the servers. We are seeing them compromise legitimate websites, exploiting platforms such as WordPress -- we think of this like an affiliate network.”
The recent 2011 top cyber security risks report from HP's Tipping Point labs said that Blackhole's popularity had grown exponentially, while other new kits, such as Sakura Pack, Yang Pack and Siberia, emerged with exploits for many recent vulnerabilities.
It also claimed that instances of compromised sites serving and redirecting to Blackhole sites over the past year grew dramatically.
It still achieved better infection rates compared to rival toolkits in 2011, despite that it used old since-patched bugs.
“They run it against the anti-virus engine and say ‘obfuscate it and the detection rate decreases',” he said.
“Personally I think the creators are one step ahead of the industry and aware of the latest technology.”
This article originally appeared at scmagazineuk.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.