Cloud security vendor Zscaler Inc. found that a malvertising campaign has been spreading the Terror exploit kit....
What is Terror, and how do malicious ads spread it?
Malvertising campaigns continue to be effective as they enable an attacker to use a legitimate website to deliver malware to users. Malvertising campaigns can be particularly dangerous because the ads and potential malware downloads look as if they come directly from the trusted website. As a result, end users may not be suspicious of pop-ups.
The next step in the process is to infect the system by using a downloader to run the malicious code on the endpoint, as getting the malware to the endpoint is crucial.
Terror is a collection of scripts and malware that is posted on a compromised website. It can be found published on ad networks and is under active development to continue to evade detection and infect endpoints.
Ask the expert:
Have a question about enterprise threats? Send it via email today. (All questions are anonymous.)
Dig Deeper on Emerging cyberattacks and threats
Related Q&A from Nick Lewis
Several vulnerabilities were found in Western Digital's My Cloud, including one that affects the default hardcoded password. Learn how to avoid such ... Continue Reading
Malicious files posing as legitimate ionCube files were recently found by WordPress and Joomla admins. Learn how the ionCube malware works with ... Continue Reading
Ploutus.D malware recently started popping up in the U.S. after several ATM jackpotting attacks. Discover how this is possible and what banks can do ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.