Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


BlackHole Attack Toolkit 2.0 made Available

The notorious BlackHole attack toolkit has been released in its latest version 2.0 as its creators assert the malware's code has been written again in order that it bypasses detection by well-known anti-virus programs, published infoworld.com dated September 12, 2012.

Only recently, creators of BlackHole 2.0 published it on Exploit.In an illegal website with the kit's latest numerous characteristics and functions. A particular addendum to the core BlackHole program relates to the utilization of randomly-designed and short-lived URLs that serve the attack codes within the Kit. Frequently, the assailants will hijack genuine Internet sites through SQL-insertion alternatively any other routine technique as also install their malevolently-crafted program onto websites followed with manipulating it for striking end-users' browsers using predetermined attack codes while the latter access the said websites. However, attackers face certain hazard i.e. when the hijacked site is identified alternatively eliminated based on any other reason, there occurs a natural death of the assault.

Interestingly, a novel arbitrary-domain generation characteristic of BlackHole can create one fresh arbitrary website through which the kit-owner's written malware lives on even though possibly for merely some seconds. Consequently, it becomes increasingly hard for identifying malevolent sites by website-owners or computer-security firms. Another characteristic of the new BlackHole camouflages the outbound web-traffic leaving any of the hijacked sites, again creating hurdles in identification.

Furthermore, the old exploits have been trimmed off BlackHole 2.0 followed with their fixations ever-since and newer exploits have been introduced. Also, there's now an increased variety of operating systems, including Windows 8 as well as any mobile platform made familiar to the malware so the attacker can separate the traffic volume, leaving the computers running any of the OSes, into segments.

The list of administrators of BlackHole has been improved on 16 fronts. Now it is quicker, statistics can been seen more easily, and Windows 8 and mobile phones are included for letting clients view the exact kind of gadgets contaminated.

Lastly, BlackHole 2.0 is available for hire for $50/day followed with its execution on a BlackHole team-owned server. But if criminals utilize personal servers then the yearly permission charges for the Kit is $1,500.

Related article: Blackhole Exploit Injected into USPS Website

» SPAMfighter News - 9/18/2012

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page