04-18-2020 , 01:06 PM
While exploit kit activity has been fairly quiet for some time now, we recently discovered a threat actor creating a copycat—fake—Malwarebytes website that was used as a gate to the Fallout EK, which distributes the Raccoon stealer.
The few malvertising campaigns that remain are often found on second- and third-tier adult sites, leading to the Fallout or RIG exploit kits, as a majority of threat actors have moved on to other distribution vectors. However, we believe this faux Malwarebytes....
YES a definite MUST read more here:
https://blog.malwarebytes.com/exploits-a...-campaign/
shows how easy it can be if we are not paying attention to detail... that extra
coffee will have to wait as we ALL need to be super vigilant when searching and downloading..
The few malvertising campaigns that remain are often found on second- and third-tier adult sites, leading to the Fallout or RIG exploit kits, as a majority of threat actors have moved on to other distribution vectors. However, we believe this faux Malwarebytes....
YES a definite MUST read more here:
https://blog.malwarebytes.com/exploits-a...-campaign/
shows how easy it can be if we are not paying attention to detail... that extra
coffee will have to wait as we ALL need to be super vigilant when searching and downloading..