x

Please Sign-In to Access this Report

To access other reports on the platform please sign in with your username and password, or register for a free account to get unlimited access and insight customized for you.

  • Home
  • IT
  • Security
  • Malware B-Z: Inside the Threat From Blackhole to ZeroAccess
Report Sophos Malware B-Z: Inside the Threat From Blackhole to ZeroAccess

Malware B-Z: Inside the Threat From Blackhole to ZeroAccess

Over the last few years the volume of malware has grown dramatically, thanks mostly to automation and exploit kits that make it easier for cybercriminals to create and distribute it.

Kits are an intrinsic part of crimeware, providing not only the toolsfor creation and distribution of malware, but also the systems to manage networks of infected computers.

Report Snap Shot

This paper provides insight into two of the most commonly used and technically capable pieces of crimeware, the Blackhole exploit kit and the ZeroAccess rootkit. It'll explore:

  • What Blackhole and ZeroAccess are and how they infect your users
  • How Blackhole and ZeroAccess attacks work
  • How to protect against Blackhole and ZeroAccess

Solution Categories

Bug Tracking Software

Bug Tracking Software

Bug tracking software refers to a specialized tool that helps organizations track, manage, and resol...