From 52f0858ef50363a114f9c8456f3850d0f5b3c4be Mon Sep 17 00:00:00 2001 From: Kafeine Date: Thu, 7 Jun 2018 10:31:58 +0100 Subject: [PATCH] + Glazunov --- clusters/exploit-kit.json | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) diff --git a/clusters/exploit-kit.json b/clusters/exploit-kit.json index 3d798a9..57bf3d5 100755 --- a/clusters/exploit-kit.json +++ b/clusters/exploit-kit.json @@ -364,7 +364,17 @@ "status": "Retired - Last seen: middle of 2015-04" }, "uuid": "55a30ccc-8905-4af2-a498-5c0010815cc1" - }, + }, + { + "value": "Glazunov", + "description": "Glazunov is an exploit kit mainly seen behind compromised website in 2012 and 2013. Glazunov compromission is likely the ancestor activity of what became EITest in July 2014. Sibhost and Flimkit later shown similarities with this Exploit Kit", + "meta": { + "refs": [ + "https://nakedsecurity.sophos.com/2013/06/24/taking-a-closer-look-at-the-glazunov-exploit-kit/" + ], + "status": "Retired - Last seen: maybe end of 2013" + }, + "uuid": "897374fa-6a35-11e8-adc0-fa7ae01bbebc" { "value": "GrandSoft", "description": "GrandSoft Exploit Kit was a quite common exploit kit used in 2012/2013. Disappeared between march 2014 and September 2017",