Talk of The Villages Florida - View Single Post - What is a malicious exploit kit website?
View Single Post
 
Old 07-10-2014, 09:49 AM
senior citizen senior citizen is offline
Sage
Join Date: Sep 2008
Posts: 4,813
Thanks: 0
Thanked 4 Times in 4 Posts
Default The one & only place it shows up is T.O.T.V. website

Quote:
Originally Posted by graciegirl View Post
Some advice. Don't go on Topix. You can get ugly things there.
The one & only place it shows up is T.O.T.V. website......
Have you encountered it on Topix???

Norton took care of it twice .......
Severity: High

No further action is required but you may wish to perform some of the following actions as a precautionary measure.
Run the Norton Power Eraser. (home users)
Run the Symantec Power Eraser. (business users)
Update your product definitions and perform a full system scan.
Identify suspicious files.
Submit suspicious files to Symantec for analysis.

An exploit kit is a drive-by download attack that looks for unpatched vulnerabilities in your operating system and programs, that can be used to install malware without any action on your part.

Norton detected the threat and blocked it. You may want to run LiveUpdate and scan your system just to be certain that nothing managed to slip though, but otherwise there is no cause for concern and really nothing else you need to do.

Note that Norton blocked the threat at the initial stage - the exploit kit. In order to infect your system the kit would still have needed to find a vulnerable program, launch the exploit and install the malicious payload.

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities

Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.