{"id":11888,"date":"2018-03-29T17:01:04","date_gmt":"2018-03-30T01:01:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/03\/29\/news-5657\/"},"modified":"2018-03-29T17:01:04","modified_gmt":"2018-03-30T01:01:04","slug":"news-5657","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/03\/29\/news-5657\/","title":{"rendered":"Exploit kits: Winter 2018 review"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 29 Mar 2018 15:00:00 +0000<\/strong><\/p>\n<p>In the past, we used to do a <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/02\/top-exploit-kits-round-up-january-edition\/\" target=\"_blank\" rel=\"noopener\">blog series<\/a> on exploit kits where we would periodically check in on the main players in the market. In March 2017, we wrote the <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/03\/exploit-kits-winter-2017-review\/\" target=\"_blank\" rel=\"noopener\">Winter 2017 review,<\/a> before exploit kit activity dropped down to a whisper. We&#8217;ve since discontinued our blog series, for lack of developments.<\/p>\n<p>A year later, however, exploit kits are showing signs of life. An uptick in campaigns and the sharpshooter-like targeting of a single country make exploits once again worth writing about.<\/p>\n<h3>Overview<\/h3>\n<p>RIG EK still remains the most common exploit kit used by different actors in a diverse set of malvertising campaigns. We haven&#8217;t observed <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/11\/terror-exploit-kit-goes-https-all-the-way\/\" target=\"_blank\" rel=\"noopener\">Terror EK since Fall 2017<\/a>, but another older kit has made a comeback. And even though it remains largely unsophisticated, GrandSoft EK has maintained its activity.<\/p>\n<p>While we aren&#8217;t seeing Sundown EK anymore, a spin-off named GreenFlash Sundown was the first (and only so far) to leverage a new Flash Player zero-day and distribute ransomware. Magnitude EK is the other exploit kit also consistently dropping its own Magniber ransomware.<\/p>\n<p>Today&#8217;s exploit kits rely on Internet Explorer and Flash Player vulnerabilities for exploitation. We found it particularly interesting that many of those exploit kits are targeting South Korea specifically.<\/p>\n<p>Coincidentally or not, both\u00a0<a href=\"http:\/\/www.zdnet.com\/article\/south-korea-victim-of-internet-explorer-zero-day-vulnerability\/\" target=\"_blank\" rel=\"noopener\">CVE-2016-0189<\/a>\u00a0(IE) and <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/new-flash-player-zero-day-comes-inside-office-document\/\" target=\"_blank\" rel=\"noopener\">CVE-2018-4878<\/a>\u00a0(Flash) were both first used in targeted zero-day attacks against South Korea before they were added into EKs.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/CVEs.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22719\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/exploit-kits-winter-2018-review\/attachment\/cves-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/CVEs.png\" data-orig-size=\"741,170\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"CVEs\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/CVEs-300x69.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/CVEs-600x138.png\" class=\"size-full wp-image-22719 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/CVEs.png\" alt=\"\" width=\"741\" height=\"170\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/CVEs.png 741w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/CVEs-300x69.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/CVEs-600x138.png 600w\" sizes=\"auto, (max-width: 741px) 100vw, 741px\" \/><\/a><\/p>\n<h3>RIG-v EK<\/h3>\n<p>RIG EK is by far the most popular exploit kit these days, with many different distribution campaigns and, as a result, the most diverse payloads (<a href=\"http:\/\/malware-traffic-analysis.net\/2018\/03\/05\/index2.html\" target=\"_blank\" rel=\"noopener\">banking Trojans<\/a>, <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/02\/new-rig-malvertising-campaign-uses-cryptocurrency-theme-decoy\/\" target=\"_blank\" rel=\"noopener\">coin miners<\/a>, and <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/01\/gandcrab-ransomware-distributed-by-rig-and-grandsoft-exploit-kits\/\" target=\"_blank\" rel=\"noopener\">ransomware<\/a>, to name a few).<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/RIGEK.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22718\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/exploit-kits-winter-2018-review\/attachment\/rigek\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/RIGEK.png\" data-orig-size=\"654,563\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"RIGEK\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/RIGEK-300x258.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/RIGEK-600x517.png\" class=\"size-full wp-image-22718 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/RIGEK.png\" alt=\"\" width=\"654\" height=\"563\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/RIGEK.png 654w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/RIGEK-300x258.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/RIGEK-600x517.png 600w\" sizes=\"auto, (max-width: 654px) 100vw, 654px\" \/><\/a><\/p>\n<h3>GrandSoft EK<\/h3>\n<p>GrandSoft is an older exploit kit that, for a strange reason, decided to make a comeback. Its code is simplistic and decipherable, and it uses rotating hostnames all housed on the same server (62.109.4[.]135). GrandSoft was used to <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/01\/gandcrab-ransomware-distributed-by-rig-and-grandsoft-exploit-kits\/\" target=\"_blank\" rel=\"noopener\">distribute the GandCrab ransomware<\/a> in late January, but has also been observed dropping <a href=\"http:\/\/malware-traffic-analysis.net\/2018\/03\/15\/index3.html\" target=\"_blank\" rel=\"noopener\">AZORult stealer<\/a>, <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/\" target=\"_blank\" rel=\"noopener\">QuantLoader<\/a>, and of course,\u00a0<a href=\"https:\/\/traffic.moe\/2018\/02\/09\/index.html\" target=\"_blank\" rel=\"noopener\">miners<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/GrandSoft_EK.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22717\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/exploit-kits-winter-2018-review\/attachment\/grandsoft_ek\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/GrandSoft_EK.png\" data-orig-size=\"654,563\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"GrandSoft_EK\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/GrandSoft_EK-300x258.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/GrandSoft_EK-600x517.png\" class=\"size-full wp-image-22717 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/GrandSoft_EK.png\" alt=\"\" width=\"654\" height=\"563\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/GrandSoft_EK.png 654w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/GrandSoft_EK-300x258.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/GrandSoft_EK-600x517.png 600w\" sizes=\"auto, (max-width: 654px) 100vw, 654px\" \/><\/a><\/p>\n<h3>GreenFlash Sundown<\/h3>\n<p>GreenFlash Sundown is an interesting exploit kit that uses URI patterns that are almost impossible to match without causing false positives. It makes heavy use of the Flash Player to hide its redirections and malicious calls rather than relying on typical HTML\/JS. Beyond this stealth feature, it is also the first exploit kit to integrate a newly-found Flash Player zero-day to <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/hermes-ransomware-distributed-to-south-koreans-via-recent-flash-zero-day\/\" target=\"_blank\" rel=\"noopener\">target South Koreans with the Hermes ransomware<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/GreenFlash_Sundown_EK_.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22712\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/exploit-kits-winter-2018-review\/attachment\/greenflash_sundown_ek_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/GreenFlash_Sundown_EK_.png\" data-orig-size=\"654,582\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"GreenFlash_Sundown_EK_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/GreenFlash_Sundown_EK_-300x267.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/GreenFlash_Sundown_EK_-600x534.png\" class=\"size-full wp-image-22712 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/GreenFlash_Sundown_EK_.png\" alt=\"\" width=\"654\" height=\"582\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/GreenFlash_Sundown_EK_.png 654w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/GreenFlash_Sundown_EK_-300x267.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/GreenFlash_Sundown_EK_-600x534.png 600w\" sizes=\"auto, (max-width: 654px) 100vw, 654px\" \/><\/a><\/p>\n<h3>Magnitude EK<\/h3>\n<p>Magnitude is a long-standing exploit kit that for some time now has been exclusively focusing on South Korea. Contrary to GreenFlash Sundown, it has dropped all support for the Flash Player and only relies on Internet Explorer for exploitation. Magnitude comes with its very own payload, <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/magniber-ransomware-exclusively-for-south-koreans\/\" target=\"_blank\" rel=\"noopener\">Magniber<\/a>, a piece of ransomware that once again only targets South Korea.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Magnitude__EK.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22811\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/exploit-kits-winter-2018-review\/attachment\/magnitude__ek\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Magnitude__EK.png\" data-orig-size=\"654,572\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Magnitude__EK\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Magnitude__EK-300x262.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Magnitude__EK-600x525.png\" class=\"size-full wp-image-22811 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Magnitude__EK.png\" alt=\"\" width=\"654\" height=\"572\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Magnitude__EK.png 654w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Magnitude__EK-300x262.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Magnitude__EK-600x525.png 600w\" sizes=\"auto, (max-width: 654px) 100vw, 654px\" \/><\/a><\/p>\n<h3>Mitigation<\/h3>\n<p>We ran all these exploit kits in our lab using Internet Explorer 10 and two different versions of the Flash Player. For GreenFlash Sundown, we updated our version of Flash to 28.0.0.137 to trigger the newest zero-day. <a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a> stopped all these exploit attempts before any payload had a chance to be dropped or executed.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Anti-Exploit_EKs.gif\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22810\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/exploit-kits-winter-2018-review\/attachment\/anti-exploit_eks\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Anti-Exploit_EKs.gif\" data-orig-size=\"888,692\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Anti-Exploit_EKs\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Anti-Exploit_EKs-300x234.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Anti-Exploit_EKs-600x468.gif\" class=\"size-full wp-image-22810 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Anti-Exploit_EKs.gif\" alt=\"\" width=\"888\" height=\"692\" \/><\/a><\/p>\n<h3>Summary<\/h3>\n<p>While exploit kits are struggling to stay relevant in a browser market share dominated by Google Chrome and a rapid decline in Flash Player usage, we have noted that several different actors are still engaged in distribution via multiple malvertising chains. Some of these actors have taken over tools once used in broader campaigns to distribute their own payload and narrow down their targets to a single country.<\/p>\n<p>Even though exploit kits have not evolved much in terms of firepower, the traffic distribution systems and gates leading to them remain active and diverse. For this reason, threat actors often mix traffic-based on user-agent information to divert victims toward exploit kits or social engineering\u2013based attacks, if the former is not deemed to be a viable option.<\/p>\n<h3>Acknowledgment<\/h3>\n<p>Thanks to <a href=\"https:\/\/twitter.com\/nao_sec\" target=\"_blank\" rel=\"noopener\">@nao_sec<\/a> for additional information about GrandSoft EK.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/exploit-kits-winter-2018-review\/\">Exploit kits: Winter 2018 review<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/exploit-kits-winter-2018-review\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 29 Mar 2018 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/exploit-kits-winter-2018-review\/' title='Exploit kits: Winter 2018 review'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2013\/12\/photodune-5376577-alert-message-l.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>In this Winter 2018 review, we check the pulse of exploit kits and their latest developments.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/exploits-threat-analysis\/\" rel=\"category tag\">Exploits<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/cve-2014-6332\/\" rel=\"tag\">CVE-2014-6332<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cve-2015-2419\/\" rel=\"tag\">CVE-2015-2419<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cve-2015-7645\/\" rel=\"tag\">CVE-2015-7645<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cve-2015-8651\/\" rel=\"tag\">CVE-2015-8651<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cve-2016-0189\/\" rel=\"tag\">CVE-2016-0189<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cve-2018-4878\/\" rel=\"tag\">CVE-2018-4878<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/eks\/\" rel=\"tag\">EKs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit-kits\/\" rel=\"tag\">exploit kits<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/grandsoft\/\" rel=\"tag\">grandsoft<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/greenflash-sundown\/\" rel=\"tag\">GreenFlash Sundown<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/magnitude\/\" rel=\"tag\">Magnitude<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rig\/\" rel=\"tag\">RIG<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/exploit-kits-winter-2018-review\/' title='Exploit kits: Winter 2018 review'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/exploit-kits-winter-2018-review\/\">Exploit kits: Winter 2018 review<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[17946,17947,17948,17949,17950,17393,11787,10528,10987,17365,17951,7871,11589,10494],"class_list":["post-11888","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cve-2014-6332","tag-cve-2015-2419","tag-cve-2015-7645","tag-cve-2015-8651","tag-cve-2016-0189","tag-cve-2018-4878","tag-eks","tag-exploit-kits","tag-exploits","tag-grandsoft","tag-greenflash-sundown","tag-magnitude","tag-rig","tag-threat-analysis"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11888"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11888\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11888"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}