Malware B-Z: Inside the Threat From Blackhole to ZeroAccess
Over the last few years the volume of malware has grown dramatically, thanks mostly to automation and exploit kits that make it easier for cybercriminals to create and distribute it.Kits are an intrinsic part of crimeware, providing not only the toolsfor creation and distribution of malware, but also the systems to manage networks of infected computers.
Report Snap Shot
This paper provides insight into two of the most commonly used and technically capable pieces of crimeware, the Blackhole exploit kit and the ZeroAccess rootkit. It'll explore:
- What Blackhole and ZeroAccess are and how they infect your users
- How Blackhole and ZeroAccess attacks work
- How to protect against Blackhole and ZeroAccess