DLT: 'Blackhole' Kits Represent 28% of Web Threats

DLT: 'Blackhole' Kits Represent 28% of Web Threats - top government contractors - best government contracting eventDLT Solutions is alerting all Internet users to a type of online threat that uses Java, Flash and PDF content to infect computers with a Trojan Horse.

Blackhole exploit kits represent 28 percent of all Web threats, the company said, and the U.S. hosts close to a third of all blackhole kits worldwide.

DLT calls blackhole kits the “world's most popular and notorious malware exploit kit,“ which leverages browser blind spots to contaminate target computers with Torjan Horse.

It utilizes infected websites, links and e-mails in order to deploy and execute a Trojan horse into a computer.

DLT said hackers use these kits because of their capabilities to protect themselves, as they contain a regenerating polymorphic code that prevents antivirus software from detecting it.

A new version of the blackhole kit gives users the options to create an IP blacklist for monitoring who visits an infected website and create their own websites.

Russian hacker “HodLum” invented the kit and originally released it in 2010.

Hackers can rent it for $200 per week through a malware-as-a-service approach, DLT said.

DLT Solutions recommends users update browsers and plugins because the kit thrives in older versions of these applications and use an antivirus software that offers host-based intrusion prevention system.

You may also be interested in...

Red Hat's David Egts: Open-Source Training, “˜Sense of Mission' Could Help Agencies Address Cyber Skills Gap - top government contractors - best government contracting event

Red Hat's David Egts: Open-Source Training, “˜Sense of Mission' Could Help Agencies Address Cyber Skills Gap

David Egts, chief technologist for Red Hat's North American public sector, has said there are several options …

HHS, Industry Aim to Help Health Organizations Mitigate Cyber Threats With New Publication - top government contractors - best government contracting event

HHS, Industry Aim to Help Health Organizations Mitigate Cyber Threats With New Publication

The Department of Health and Human Services has released a four-volume document that outlines 10 …

Cloud-Based Identity Tools, Mobile Device-Based Authentication Among Cyber Market Trends to Watch in 2019 - top government contractors - best government contracting event

Cloud-Based Identity Tools, Mobile Device-Based Authentication Among Cyber Market Trends to Watch in 2019

Some of the trends in the cybersecurity market to watch in 2019 include the availability …