[ISN] Game Over for Neosploit?

From: InfoSec News <alerts_at_private>
Date: Wed, 30 Jul 2008 00:17:10 -0500 (CDT)
http://securitywatch.eweek.com/exploits_and_attacks/game_over_for_neosploit.html

By Matthew Hines 
eWEEK Security Watch
July 29, 2008

Researchers at RSA's FraudAction Research Lab are reporting that the 
group behind the Neosploit malware infection tool kit may have thrown in 
the towel, which, if true, means an end to one of the badware industry's 
most successful and high-profile business ventures thus far.

It's hard to pinpoint exactly when researchers first noticed the malware 
development framework being sold on underground bulletin boards, but 
Neosploit has been around for at least the last two years or so.

And, as RSA experts point out, based on its ease of use, wide 
availability and relatively low buy-in cost (it's typically offered for 
between $1,500 and $3,000) the tool kit has become one of the most 
popular framework-driven means of launching malware attacks over the 
course of its run.

More importantly, Neosploit paved the way for other professional-grade 
malware tool kits such as the MPack and IcePack frameworks, among 
others, with the manner in which it was marketed as a professionally 
supported product, offering active customer service and code updates 
just as companies provide for their legitimate software programs.

[...]


_______________________________________________      
Attend Black Hat USA, August 2-7 in Las Vegas, 
the world's premier technical event for ICT security experts.
Featuring 40 hands-on training courses and 80 Briefings 
presentations with lots of new content and new tools.
Network with 4,000 delegates from 50 nations.  
Visit product displays by 30 top sponsors in 
a relaxed setting. http://www.blackhat.com
Received on Tue Jul 29 2008 - 22:17:10 PDT

This archive was generated by hypermail 2.2.0 : Tue Jul 29 2008 - 22:28:15 PDT