Dissecting the activities and capabilities of RIG Exploit Kit

CERT-LatestNews SocialEngineering ThreatsCybercrime VulnerabilitiesAdobe VulnerabilitiesAll VulnerabilitiesApplications VulnerabilitiesCrypto VulnerabilitiesMicrosoft VulnerabilitiesNetwork
Over the past years, the exploit kit has been observed installing various malware ranging from banking trojans to ransomware. However, since 2017, there has been a major shift in its activity and is being now used to deliver cryptominers as well. RIG exploit kit, next to the prolific Fallout exploit kit, is the most actively used exploit kit.