Terror EK actor experiments with URL shortener fraud

  • 20 July 2017
  • 0 replies
  • 100 views

Userlevel 7
Badge +54
July 20, 2017  by Jérôme Segura
 


 
Terror EK is an exploit kit made from a mishmash of stolen code and with very limited distribution. In the past few months, we have seen a few minor updates to its code base which remains largely simplistic in comparison to professional-grade exploit kits of the past such as Angler EK, or modern-day Astrum EK.
 
We recently observed activity from one actor that appears to be doing some experiments with the toolkit. This post takes a look at a malvertising chain that leads to Terror EK in which the individual had set up his own redirect and bogus fraud page.
 
Full Article.

0 replies

Be the first to reply!

Reply