BlackHole Developer, Creator of Cool Exploit Toolkit too; Brian Krebs
American journalist Brian Krebs who is also an investigative reporter has confirmed that the person who developed the infamously known BlackHole exploit kit is also the creator of Cool Exploit Toolkit that was recently detected and found as a distributor of ransomware, published softpedia.com dated January 7, 2013.
Krebs states that Cool Exploit Toolkit that's presently available at a rented price of USD10,000 (EUR 8,000) features solely custom 0-day attack codes.
And when Cool Exploit Kit creator declared the launch of his malware, he articulated that the current problem with the exploit trade was not unknown to the general mass. Therefore for resolving that difficulty, he along with his team readied a unique scheme of buying latest Web-browser as well as browser plug-in security flaws.
Cool's creator further stated that their group, along with purchasing attack codes and security flaws, also bought publicly available exploits that had been improved upon as well as all proper solutions that enhanced exploitation incidences. As its project's main resource, the group had allocated a budget of $100,000 for buying Web-browser as well as browser plug-in security flaws that wouldn't be made public while the group would be their exclusive user.
In the meantime, it isn't evident what number of cyber-crooks prefers and uses the Cool Exploit Toolkit given the huge utility price of the same. However, according to French researcher Kafeine who is also an active blogger, the latest toolkit has attracted solely 2 different ransomware crime syndicates of which one is utilizing the Cool for distributing the ransomware called Reveton, outlines journalist Krebs.
Apparently, the Reveton gangsters have the sole ability to hire Cool for the fixed $10K/month. Lately, Symantec issued a detailed assessment of Reveton's affliction. The assessment formerly enabled Symantec's analysts to acquire admission into one control panel that certain ransomware gang utilized which revealed the total inbound linkages with the booby-trapped websites involved within the campaign. It was computed that the gang extorted over $30,000/day or possibly nearly $400,000/month via their ransomware attack. Now back during August 2012, Krebs uncovered one ransomware operation that fetched the identical sums as mentioned.
Related article: Blackhole Exploit Injected into USPS Website
» SPAMfighter News - 11-01-2013