Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Tools for hackers continue to develop

Aladdin Knowledge Systems : 29 September, 2008  (Technical Article)
Neosploit 3.1 is alive and well and is continuing to be used by hackers as an exploit development tool worldwide
Despite being reported as "out of business" in late July/August, Neosploit, one of the most widely used tools by cybercriminals, is clearly not gone. In fact, Ian Amit, director of security research at Aladdin Knowledge Systems has discovered a highly enhanced Neosploit 3.1 and the hundreds of thousands of Web sites it has already infected worldwide. Amit is working with law enforcement from around the globe to identify infections and inform organizations. It's clear that Neospolit actually planned to create Neosploit 3.1 and has actually made it available for at least the last few weeks on a significant scale. Aladdin's Amit discovered this latest eCrime tool has been under security expert's noses for a while when he uncovered that a huge increase in PDF exploits was not actually a new threat on its own, but instead is a key tool within the new Neosploit 3.1.

What does all this mean? It's a truly notable instance where the actual business side of running cybercrime operations pulled a fast one on the thousands of experts tasked with following the latest Web threats. They not only see the profitability of investing in development of newer versions - releasing cybercrime tools much like that of a typical software company. And it's all proven by their greatly enhanced version of Neosploit 3.1 that was never anticipated by even the largest of security vendors. Instead, security vendors thought, for example, that newly enhanced PDF exploits were within themselves the new trend - when actually it's direct from Neosploit and a large part of Neosploit's punch.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo