Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Public

Coders of Nuclear Exploit kit making large profits

Kyle by Kyle
May 30, 2016 - Updated on June 1, 2016
in Public, Malware
0
0uWpw2K
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Based on Check Point’s analysis of the Nuclear Exploit kit (EK), the coders are estimated to earning over $100,000 every month.

You might also like

Emotet now utilizing Onenote for its spam campaigns

Netwire RAT seized by FBI and other worldwide police agencies

The Emotet botnet returns and is sending a slew of malicious emails

Renting out exploit kits is nothing new, for example the Blackhole EK was selling all over underground forums using other users as re-sellers. But Nuclear is climbing to new heights, existing on the black market since early 2010.

Similar to its rivals, the Nuclear EK is usually rented to attackers for a restricted duration and the attackers are then given access the EK’s control panel. Based on the Check Point’s analysis, this panel is operating on a nginx/1.8.0 server using a non-trivial port so it stays hidden from web crawlers. The control panels are all connected to one master server. This server provides the Flash, JavaScript and VBScript exploits as well as it keeping them undetected.

Nuclear-EK-

The traffic, malware and traffic distribution service (TDS) are the up to the buyer, below you can view the path a unsuspecting victim will follow.

Nuclear exploit kit

Check Point’s report states that they’ve discovered 15 active control panels for Nuclear which are rented for a couple thousand dollars per month. It’s estimated that the creators of the Nuclear EK are earning nearly 100K USD each month.

Current infection rates of the Nuclear Exploit Kit:

Check Point states that 1,846,678 machines were attacked and 184,568 machines have been successfully exploited, which is close to a 10% infection rate. In the graph below you are able to see the infection rate per browser with Internet Explorer 8 leading the chart.

Nuclear-EK

Tags: exploit kitmalewareNuclear
Share30Tweet19
Kyle

Kyle

Co-owner, writer, and editor at ZeroSecurity. Security, Blockchain, and SEO enthusiast. "Formal education will make you a living; self-education will make you a fortune."

Recommended For You

Emotet now utilizing Onenote for its spam campaigns

by Kyle
March 26, 2023
0
Emotet now utilizing Onenote for its spam campaigns

The infamous Emotet malware has adopted a new tactic to spread its infection. Cybercriminals are now distributing the malware via email attachments in Microsoft OneNote format. The move...

Read more

Netwire RAT seized by FBI and other worldwide police agencies

by Christi Rogalski
March 16, 2023
0
Netwire RAT seized by FBI and other worldwide police agencies

The FBI, in partnership with several police agencies worldwide, has carried out an international law enforcement operation resulting in the arrest of a suspected administrator of the NetWire...

Read more

The Emotet botnet returns and is sending a slew of malicious emails

by Kyle
March 14, 2023
0
The Emotet botnet returns and is sending a slew of malicious emails

The notorious Emotet botnet, considered one of the biggest threats to internet security, has resurfaced after a prolonged hiatus, armed with new tactics. The botnet's trademark strategy of...

Read more

Update-resistant malware infects SonicWall security appliances

by Paul Anderson
March 12, 2023
0
Update-resistant malware infects SonicWall security appliances

Researchers have discovered that threat actors linked to the Chinese government are using malware to infect SonicWall's Secure Mobile Access 100, a popular security appliance, which remains active...

Read more

Fake ChatGPT websites are popping up and spreading malware

by Paul Anderson
March 1, 2023 - Updated on March 2, 2023
0
ChatGPT is found spreading malware created in Python

It was only a matter of time before hackers would start using the growing popularity of ChatGPT to spread malware and steal sensitive personal information. Recently, multiple security...

Read more
Next Post
New MySQL local zero-day affecting versions 5.5.45 and above

New MySQL local zero-day affecting versions 5.5.45 and above

Related News

BreachForums Owner Arrested and Charged

BreachForums Owner Arrested and Charged

March 17, 2023
ChipMixer platform tied to crypto laundering scheme – seized by authorities

ChipMixer platform tied to crypto laundering scheme – seized by authorities

March 17, 2023
NSA intercepting U.S. Routers

NSA intercepting U.S. Routers

June 6, 2014 - Updated on March 17, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.