1. Exploit Kits in a Post-Angler Era
Magnitude
Discovery Date: 2013
# of Vulnerabilities Exploited
Year
20122011 2013 2014 2015 2016
6
1 1 1
5
2
Neutrino
Discovery Date: 2013
# of Vulnerabilities Exploited
Activity Level
2013
Year
2012 2014 2015 2016
7
1 1
3 3
RIG
Sundown
Activity Level
Low
High
Discovery Date: 2014
# of Vulnerabilities Exploited
An exploit kit is a tool used to target the vulnerabilities in your
software and infect it with malware. In the wake of the recent
demise of Angler, the marketplace is now in a transitionary phase.
Below you can dive into the case files of the exploit kits most likely
to fill the void left by Angler.
Year
1
2012 2013 2014 2015
7
4
2
Discovery Date: 2015
# of Vulnerabilities Exploited
2013
Year
2012 2014 2015 2016
1 1
3 3
7
To learn more, read our report:
In The Business of Exploitation
Data Updated: 10/12/2016
Public Availability
Low
High
Public Availability
Activity Level
Low
High
Public Availability
Activity Level
Low
High
Public Availability