{"id":12555,"date":"2018-06-12T12:10:12","date_gmt":"2018-06-12T20:10:12","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/06\/12\/news-6324\/"},"modified":"2018-06-12T12:10:12","modified_gmt":"2018-06-12T20:10:12","slug":"news-6324","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/06\/12\/news-6324\/","title":{"rendered":"Exploit kits: Spring 2018 review"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 12 Jun 2018 19:04:14 +0000<\/strong><\/p>\n<p>Since our last <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/exploit-kits-winter-2018-review\/\" target=\"_blank\" rel=\"noopener\">report<\/a> on exploit kits, there have been some new developments with the wider adoption of the <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/new-flash-player-zero-day-comes-inside-office-document\/\" target=\"_blank\" rel=\"noopener\">February Flash zero-day<\/a>, as well as the inclusion of a new exploit for <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-explorer-zero-day-browser-attack\/\" target=\"_blank\" rel=\"noopener\">Internet Explorer<\/a>. We have not seen that many changes in the drive-by landscape for a long time, although these are the results of improvements closely tied to malspam campaigns and exploits embedded within Microsoft Office.<\/p>\n<p>Since both Flash and the VBScript engine are pieces of software that can be leveraged for web-based attacks, it was only natural to see their integration into exploit kits. While Internet Explorer is not getting any younger, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-8174\" target=\"_blank\" rel=\"noopener\">CVE-2018-8174<\/a> brings an update to an otherwise 2-year-old vulnerability (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-0189\" target=\"_blank\" rel=\"noopener\">CVE-2016-0189<\/a>), which is still used in some drive-by campaigns. As far as Flash is concerned, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-4878\" target=\"_blank\" rel=\"noopener\">CVE-2018-4878<\/a> has been adopted by almost all exploits kits. At the time of this writing, a newer Flash vulnerability (<a href=\"https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb18-19.html\" target=\"_blank\" rel=\"noopener\">CVE-2018-5002<\/a>) is available but has not been spotted in any EK so far.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/CVEs_.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24143\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/06\/exploit-kits-spring-2018-review\/attachment\/cves_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/CVEs_.png\" data-orig-size=\"741,87\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"CVEs_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/CVEs_-300x35.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/CVEs_-600x70.png\" class=\"size-full wp-image-24143 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/CVEs_.png\" alt=\"\" width=\"741\" height=\"87\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/CVEs_.png 741w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/CVEs_-300x35.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/CVEs_-600x70.png 600w\" sizes=\"auto, (max-width: 741px) 100vw, 741px\" \/><\/a><\/p>\n<h3>RIG<\/h3>\n<p>RIG exploit kit remains the most commonly observed EK in the wild, with several different campaigns in action. Rig was the <a href=\"https:\/\/twitter.com\/kafeine\/status\/999909946496962560\" target=\"_blank\" rel=\"noopener\">first to include the new VBScript engine exploit<\/a> (CVE-2018-8174) in IE only days after a <a href=\"https:\/\/github.com\/smgorelik\/Windows-RCE-exploits\/tree\/master\/Web\/VBScript\" target=\"_blank\" rel=\"noopener\">Proof of Concept<\/a> became publicly available, on top of <a href=\"https:\/\/twitter.com\/kafeine\/status\/983430384263327744\" target=\"_blank\" rel=\"noopener\">adding CVE-2018-4878<\/a>. RIG has pushed various payloads such as <a href=\"https:\/\/traffic.moe\/2018\/04\/19\/index.html\" target=\"_blank\" rel=\"noopener\">Bunitu<\/a>, <a href=\"https:\/\/traffic.moe\/2018\/05\/16\/index.html\" target=\"_blank\" rel=\"noopener\">Ursnif<\/a>, and the popular <a href=\"https:\/\/traffic.moe\/2018\/04\/25\/index.html\" target=\"_blank\" rel=\"noopener\">SmokeLoader<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/RIG_EK.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24138\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/06\/exploit-kits-spring-2018-review\/attachment\/rig_ek-6\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/RIG_EK.png\" data-orig-size=\"707,902\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"RIG_EK\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/RIG_EK-235x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/RIG_EK-470x600.png\" class=\"size-full wp-image-24138 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/RIG_EK.png\" alt=\"\" width=\"707\" height=\"902\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/RIG_EK.png 707w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/RIG_EK-235x300.png 235w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/RIG_EK-470x600.png 470w\" sizes=\"auto, (max-width: 707px) 100vw, 707px\" \/><\/a><\/p>\n<h3>GrandSoft<\/h3>\n<p>GrandSoft is an IE-only exploit kit which is observed in a smaller range of distribution campaigns, mostly via malvertising on adult sites. In comparison to its counterparts, GrandSoft is still relying on the older Internet Explorer exploit (CVE-2016-0189) and lacks the obfuscation we normally see in landing pages. Some payloads pushed by GrandSoft include the <a href=\"https:\/\/traffic.moe\/2018\/04\/11\/index.html\" target=\"_blank\" rel=\"noopener\">AZORult stealer<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/GrandSoft_EK.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24136\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/06\/exploit-kits-spring-2018-review\/attachment\/grandsoft_ek-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/GrandSoft_EK.png\" data-orig-size=\"707,746\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"GrandSoft_EK\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/GrandSoft_EK-284x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/GrandSoft_EK-569x600.png\" class=\"size-full wp-image-24136 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/GrandSoft_EK.png\" alt=\"\" width=\"707\" height=\"746\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/GrandSoft_EK.png 707w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/GrandSoft_EK-284x300.png 284w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/GrandSoft_EK-569x600.png 569w\" sizes=\"auto, (max-width: 707px) 100vw, 707px\" \/><\/a><\/p>\n<h3>Magnitude<\/h3>\n<p>The South Korea\u2013focused exploit kit is back to using its trusted EK Magniber after having a <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/magnitude-exploit-kit-switches-gandcrab-ransomware\/\">short stint with GandCrab ransomware<\/a>. Magnitude <a href=\"https:\/\/twitter.com\/kafeine\/status\/980505556715786242\" target=\"_blank\" rel=\"noopener\">added Flash<\/a> (CVE-2018-4878) and <a href=\"https:\/\/twitter.com\/kafeine\/status\/1002881951060160512\" target=\"_blank\" rel=\"noopener\">went on to integrate IE&#8217;s CVE-2018-8174<\/a> after a hiatus of about a week with no activity. With its own Magnigate filtering, Base64-encoded landing page and fileless payload, Magnitude is one of the more sophisticated exploit kits on the market.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/Magnitude_EK.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24135\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/06\/exploit-kits-spring-2018-review\/attachment\/magnitude_ek-4\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/Magnitude_EK.png\" data-orig-size=\"707,695\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Magnitude_EK\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/Magnitude_EK-300x295.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/Magnitude_EK-600x590.png\" class=\"size-full wp-image-24135 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/Magnitude_EK.png\" alt=\"\" width=\"707\" height=\"695\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/Magnitude_EK.png 707w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/Magnitude_EK-300x295.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/Magnitude_EK-600x590.png 600w\" sizes=\"auto, (max-width: 707px) 100vw, 707px\" \/><\/a><\/p>\n<h3>GreenFlash Sundown<\/h3>\n<p>The elusive GreenFlash Sundown continues to strike via compromised OpenX ad servers. Although it is usually seen distributing the Hermes ransomware, 360 Total Security observed a <a href=\"https:\/\/blog.360totalsecurity.com\/en\/incoming-multiple-popular-websites-attacked-cryptocurrency-mining-via-greenflash-sundown-exploit-kit\/\" target=\"_blank\" rel=\"noopener\">cryptocurrency miner via several Chinese websites<\/a> running a vulnerable OpenX version. The ad banner used by GF Sundown in this attack, as well as some we documented before, is a Korean language picture that <a href=\"https:\/\/twitter.com\/kafeine\/status\/972427859909316608\" target=\"_blank\" rel=\"noopener\">hides CVE-2018-4878<\/a> using <a href=\"https:\/\/en.wikipedia.org\/wiki\/Steganography\" target=\"_blank\" rel=\"noopener\">steganography<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/GreenFlash_Sundown_EK.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24144\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/06\/exploit-kits-spring-2018-review\/attachment\/greenflash_sundown_ek\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/GreenFlash_Sundown_EK.png\" data-orig-size=\"707,611\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"GreenFlash_Sundown_EK\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/GreenFlash_Sundown_EK-300x259.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/GreenFlash_Sundown_EK-600x519.png\" class=\"size-full wp-image-24144 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/GreenFlash_Sundown_EK.png\" alt=\"\" width=\"707\" height=\"611\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/GreenFlash_Sundown_EK.png 707w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/GreenFlash_Sundown_EK-300x259.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/GreenFlash_Sundown_EK-600x519.png 600w\" sizes=\"auto, (max-width: 707px) 100vw, 707px\" \/><\/a><\/p>\n<h3>A busy 2018<\/h3>\n<p>There is no doubt that the recent influx of zero-days has given exploit kits a much-needed boost. We did notice an increase in RIG EK campaigns, which probably resulted in higher than usual successful loads for its operators. While attackers are concentrating on Microsoft Office\u2013related exploits, we are observing a cascading effect into exploit kits.<\/p>\n<p>So far, 2018 has been busier than usual with the discoveries of several directly applicable zero-days, and we can expect to see more in the coming months. For instance, we have already witnessed back-to-back Flash zero-days where attackers are capitalizing on ActionScript vulnerabilities.<\/p>\n<h3>Mitigation<\/h3>\n<p>We tested these exploit kits against <a href=\"https:\/\/www.malwarebytes.com\/pricing\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a>, and they were all blocked thanks to our signature-less anti-exploit engine:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/EKs_Spring_2018.gif\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24139\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/06\/exploit-kits-spring-2018-review\/attachment\/eks_spring_2018\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/EKs_Spring_2018.gif\" data-orig-size=\"935,777\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"EKs_Spring_2018\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/EKs_Spring_2018-300x249.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/EKs_Spring_2018-600x499.gif\" class=\"size-full wp-image-24139 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/EKs_Spring_2018.gif\" alt=\"\" width=\"935\" height=\"777\" \/><\/a><\/p>\n<p><em>Hashes for samples referenced in this post:<\/em><\/p>\n<p><strong>RIG<\/strong><\/p>\n<pre>8CA1DEDCED7332AEDC94291F8DAA82E0837A1EFC612B581DD13165B29F2A6DBB   21358ACDEB60C456BC36B8E3481BF66CC5F4167D5994F097F71798341B9119FB   560031AC4C947B1E168704CA5E323BF00A801E2320E1F0FFFE08392179D38391   AC1FF2B2A18931C17A5D9D0305CE72CC69C1688DFC2BDF4BF74AA9E27123BFFD<\/pre>\n<p><strong>GrandSoft<\/strong><\/p>\n<pre>E659DD280514DD81BF8923315BD503E8781EB8CE7684F4888A838CF2A8B2ADF0<\/pre>\n<p><strong>Magnitude<\/strong>\u00a0(dumped from memory with <a href=\"https:\/\/github.com\/hasherezade\/pe-sieve\" target=\"_blank\" rel=\"noopener\">PE-Sieve<\/a>)<\/p>\n<pre>9491E8B30D37CB3BD0D206021EBE7396CA17BE3C8FBED2AC6DCE89D3CE0CAA27<\/pre>\n<p><strong>GreenFlash<\/strong> (dumped from memory with <a href=\"https:\/\/github.com\/hasherezade\/pe-sieve\" target=\"_blank\" rel=\"noopener\">PE-Sieve<\/a>)<\/p>\n<pre>e600dec30c0f5080eab3d15f1210334429c3db0dd6a90f1e755709783ace6e85<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/06\/exploit-kits-spring-2018-review\/\">Exploit kits: Spring 2018 review<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/06\/exploit-kits-spring-2018-review\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 12 Jun 2018 19:04:14 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/06\/exploit-kits-spring-2018-review\/' title='Exploit kits: Spring 2018 review'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/shutterstock_1033292395-3.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>In this Spring 2018 snapshot, we review the top exploit kits observed in the wild.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/exploits\/\" rel=\"category tag\">Exploits<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/ek\/\" rel=\"tag\">EK<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/eks\/\" rel=\"tag\">EKs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit-kits\/\" rel=\"tag\">exploit kits<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/grandsoft\/\" rel=\"tag\">grandsoft<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/greenflash-sundown\/\" rel=\"tag\">GreenFlash Sundown<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/magnitude\/\" rel=\"tag\">Magnitude<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rig\/\" rel=\"tag\">RIG<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/06\/exploit-kits-spring-2018-review\/' title='Exploit kits: Spring 2018 review'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/06\/exploit-kits-spring-2018-review\/\">Exploit kits: Spring 2018 review<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[4503,10527,11787,10528,10987,17365,17951,7871,11589],"class_list":["post-12555","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cybercrime","tag-ek","tag-eks","tag-exploit-kits","tag-exploits","tag-grandsoft","tag-greenflash-sundown","tag-magnitude","tag-rig"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12555"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12555\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12555"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}