Threat Database Trojans Sweet Orange Exploit Kit

Sweet Orange Exploit Kit

By Domesticus in Trojans

For the last few years, the words 'Exploit Kit' have been nearly synonymous with the infamous Black Hole exploit kit. However, the Sweet Orange exploit kit is gaining traction as a more effective alternative to this dangerous hacking tool. In fact, the creators of this exploit kit are boasting better infection rates as well as other numerous features that have made various components of the Black Hole exploit kit yesterday's news. The Sweet Orange exploit kit has an infection rate of up to 25% and can be used to increase the traffic of a website (and its associated revenue) by up to 150,000 unique visitors per day! According to the creators of the Sweet Orange exploit kit, this dangerous exploit kit can be used to add nearly forty thousand computers to a botnet every day! One of the reasons why Sweet Orange exploit kit is particularly worrying is that Sweet Orange exploit kit is associated with 45 different IP addresses and nearly 300 unique domains, making it quite difficult for anti-malware software to deal with this threat.

What Makes the Sweet Orange Exploit Kit So Dangerous

Many of the malicious URLs associated with the Sweet Orange exploit kit are not even detected as malicious by top anti-virus software on the market. The detection rate for many anti-malware programs is dismal, in fact, when it comes to the Sweet Orange exploit kit. Because of this, Sweet Orange exploit kit is gaining popularity among Black Hat SEO specialists, hackers and criminals. The Sweet Orange exploit kit is constantly updated and simultaneously tries to exploit known vulnerabilities in the most popular web browsers, the Java platform and Adobe Systems software.

The Sweet Orange exploit kit will usually be used in conjunction with other kinds of malware. For example, in the case of the Black Hole exploit kit, it was often used to install the Zeus Trojan, a popular banking Trojan. An exploit kit will usually be used to try to take advantage of known vulnerabilities in an infected computer. These vulnerabilities will usually come from not updating software regularly or from using vulnerable applications on the infected computer. Using the Sweet Orange exploit kit, criminals can find ways to execute malicious code on the victim's computer, then installing other malware using these vulnerabilities. Computer users will usually be directed towards the Sweet Orange exploit kit through social engineering tactics that urge them to click on a particular link or open a malicious file.

Trending

Most Viewed

Loading...