1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

RIG exploit kit takes over while Angler on vacation

Discussion in 'CSO' started by RSS, Jan 12, 2016.

  1. RSS

    RSS New Member Member

    The Angler exploit kit went on vacation during the first two weeks of the year, but the Russia-hosted RIG exploit kit was there to ensure that there would be no respite for users from malvertising and malicious drive-by downloads, according to a new report.

    Researchers at Cisco's Talos Security Intelligence and Research Group traced RIG to a single hosting provider out of Russia, Eurobyte, which proved to be uncooperative when it came to taking it down.

    "Eurobyte is a downstream provider from Webzilla," said threat researcher Nick Biasini. "Webzilla was very responsive and worked to make sure the hosts were taken down. Eurobyte was not really responsive to us, despite several attempts to contact them."

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page