You are reading 1 threads
  • Author
    Messages
    • #26139
      Nicholas Coolman
      Key Master

      UndernewsThree new vulnerabilities exploited by the Purple Fox trojan.

      Proofpoint researchers also observed that the Purple Fox exploit kit had been updated to exploit two new vulnerabilities: CVE-2020-0674 and CVE-2019-1458. CVE-2020-0674 is a vulnerability that compromises scripting engine memory in Internet Explorer,… (Read more)

      Proofpoint is an enterprise security company based in Sunnyvale, California that provides software as a service and products for inbound email security, data loss prevention...Wikipedia

      Un Trojan horse (Trojan Horse in English) is a type of malware, often confused with viruses or other parasites. The Trojan horse is software that appears legitimate, but contains malware. The role of the Trojan horse is to bring this parasite onto the computer and install it there without the user's knowledge. The contained program is called the "payload". It can be any type of parasite: virus, keylogger, spyware. It is this parasite, and it alone, which will execute actions within the victim computer. The Trojan horse is nothing other than the vehicle, the one that “brings the wolf into the fold”. This software is not harmful in itself because it does not perform any action other than allowing the installation of the real parasite. In their cyberattacks, hackers can use the trojan payload to install ransomware.

       

      Free support forum
      Nicholas Coolman

    • #26140
      Nicholas Coolman
      Key Master

      Purple Fox EK adds exploits for CVE-2020-0674 and CVE-2019-1458 to its arsenal.

      Purple Fox is an exploit kit (EK) that appears to have been designed to replace the RIG exploit kit (EK) in the Purple Fox malware (a Trojan/rootkit) distribution chain. By creating their own EK for distribution, Purple Fox malware authors can save money by no longer paying for the Rig EK. (Read more)

      Free support forum
      Nicholas Coolman

You are reading 1 threads
  • You must be logged in to reply to this topic.
Back to top