2013 has seen some significant changes in the way that attackers use the Blackhole exploit kit in spam attacks. To understand what these changes are, however, let us first go into what Blackhole did in late 2012.Last year, the majority of URLs found in Blackhole-related phishing messages had the following format: http://{compromised or abused site}/{eight-digit […]
Latest Comments