Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Virus and Exploit Kit Discussion Topics


  • Please log in to reply
1 reply to this topic

#1 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,268 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:11:42 PM

Posted 24 September 2013 - 11:25 AM

This pinned topic contains links to various discussion topics related to computer infection and exploit kits. For more information or to discuss a particular infection or exploit kit, please select a an existing topic listed below or create a new one dedicated to that particular subject.

Current Virus or Exploit Kit Discussion Topics:

KEYHolder Support and Discussion Topic

TorrentLocker Support and Discussion Thread (CryptoLocker copycat)

CryptoWall - new variant of CryptoDefense

SuperCrypt Ransomware Support Topic

Cryptolocker Ransomware Discussion Topic

DirtyDecrypt Ransomware Discussion Topic

Carberp Malware Kit Discussion Topic

ACCDFISA Protection Center Ransomware Discussion Topic

HowDecrypt or Cryptorbit File Encrypting Ransomware - $500 USD Ransom Information Topic
 
CTB Locker or DecryptAllFiles.txt Encrypting Ransomware sets extension to .CTBL

If you create a new topic, please post a reply to this topic with the link.

BC AdBot (Login to Remove)

 


m

#2 tealover

tealover

  • Members
  • 174 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Chester, UK
  • Local time:05:42 AM

Posted 09 October 2015 - 07:43 AM

Has anyone studied the mechanism of how exploits produced and inserted, a fascinating subject?

 

Surprisingly enough delivery can be achieved with that old chestnut, the buffer overflow. Up to 3000 exploits using this delivery mechanism are detected every year on the web.

 

Since many of these processes run as root, or SYSTEM, successfully exploiting them allows a malicious user a privilege escalation that amount to total control over the target machine.

 

Windows infamously revamped its security focus after two buffer overflow-driven exploits in the early 2000's. And a buffer overflow found in a Linux driver left (potentially) millions of home and small office routers vulnerable to attack.

 

​Whilst these exploits are largely unsuccessful on current Windows and linux systems due to up to date patching,they can still attack companies legacy programs written in C or C++.

 

Never let your guard down, vigilance is needed at all times!!






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users