Glazunov Exploit Kit Description
How the Attacks that Incorporate the Glazunov Exploit Kit Work
Specific Characteristics of the Glazunov Exploit Kit Attack
Although exploit kits are among the most common types of malware attacks, the Glazunov Exploit Kit uses a technique that has caught the attention of PC security researchers. It's associated redirect Trojans do not stop with merely injecting a redirect script. The Glazunov Exploit Kit uses redirects that compromise an entire Web page and that are hosted on the Glazunov Exploit Kit's malicious server. The malicious files associated with the Glazunov Exploit Kit are hosted on the exploit kit's own server, making them also more difficult to study and intercept. At present, the Glazunov Exploit Kit is being used to force computer users to download and install ransomware Trojans, malware infections that are typically designed to block all access to the infected computer in order to extract a ransom from the victim.