Unique Sploits Pack. Crimeware to automate the exploitation of vulnerabilities
The development of automated tools to commit other criminal acts and/or malware (crimeware) is another of the many businesses that are established around the dark world, and not so dark as computer.
Unique Sploit Pack is another example. A Russian source package designed to allow different exploit vulnerabilities in many of the most used applications by users at a price of USD 600, plus USD 100 each update.
Unique Sploit Pack is another example. A Russian source package designed to allow different exploit vulnerabilities in many of the most used applications by users at a price of USD 600, plus USD 100 each update.

- Exploits for MDAC (recently updated) Office (updated) and others that provide the basis of samples for Internet Explorer since version 4 through 7, Opera 9 and Firefox.
- Exploit for Adobe Reader. Vulnerability CVE-2008-2992.
- PDF Exploits for SPL (v.8.1.2 vulnerability from 05 November 2008) for improved performance through Internet Explorer, Opera and Firefox.
- Exploit for the web browser Amaya 11.
- Module that provides a vulnerable version of Adobe Acrobat Reader.
- Module "mod_vparivatel" designed to exploit the human factor through social engineering trying to get users to download malicious code.
- Module "vparivate" that tries to infect the computers of potential victims by deploying social engineering to download a fake antivirus (scareware).
- Encryption module. Optional for USD 50.

This type of applications provides a solid basis for the attack by malware because each exploits, modules and scripts that comprise it, are intentionally created to allow execution of binary code and arbitrarily on victim machines.
Related information
LuckySploit, the right hand of ZeuS
Botnet Zeus. Mass propagation of his Trojan. Part ...
Creating Online PoisonIvy based polymorphic malwar...
Jorge Mieres
0 comentarios:
Post a Comment