Home Malware Programs Malware Glazunov Exploit Kit

Glazunov Exploit Kit

Posted: July 3, 2013

Threat Metric

Threat Level: 2/10
Infected PCs: 12
First Seen: July 3, 2013
Last Seen: July 3, 2022
OS(es) Affected: Windows

The Glazunov Exploit Kit is a PC threat that specializes in installing malware onto your PC after your browser has loaded a malicious or compromised site that contains the Glazunov Exploit Kit's primary components. The latest analyses on the Glazunov Exploit Kit's behavior has led to confirmation that Apache server-based sites are more vulnerable to being attacked than others – although sites using other forms of software still are vulnerable to being compromised. Most, but not all Glazunov Exploit Kit attacks have resolved into delivering ransomware, which may display fake legal warnings, block various applications (possibly including your overall operating system) or request an illegal ransom fee. SpywareRemove.com malware researchers only can suggest the same, standardized anti-malware strategies and software against the Glazunov Exploit Kit that they would recommend for countering any exploit kit, both in terms of blocking the drive-by-download attacks and deleting the infections resulting from a successful attack.

When Good Software and Sites Can Be Exploited for Malware Delivery

The Glazunov Exploit Kit is a Web-based PC threat, with sites hosting its major components usually identified as Mal/ExpJS-BH. As this name would seem to indicate, the Glazunov Exploit Kit does require both JavaScript and Java to attack your computer, and disabling these features – at least when they're not absolutely needed – can go a long way to keeping your PC safe from its attacks. The Glazunov Exploit Kit's previous attack patterns have centralized predominantly around the United States and Europe, although SpywareRemove.com malware researchers also warn that the Glazunov Exploit Kit has been seen in other regions, as well.

The majority of exploit kits inject their redirect components into unrelated sites, allowing them to trigger and redirect the browsers of victims to secondary websites, which contain the bulk of the EK's code. However, the Glazunov Exploit Kit usually utilizes a technically interesting diversion from this strategy – instead of just injecting a simple redirect to another Web page, the Glazunov Exploit Kit injects an actual Web page's worth of content, including its primary components. Other exploit kits very similar to the Glazunov Exploit Kit, such as the Flimkit Exploit Kit or the Sibhost Exploit Kit, have been seen using other methods, such as concealing redirects in malicious Flash advertisements.

Once your PC loads the affected Web page, assuming it doesn't have any meaningful defenses in place, the Glazunov Exploit Kit will install its malicious software to your hard drive automatically, and as SpywareRemove.com malware researchers have taken pains to note, without symptoms of the drive-by-download's occurrence. Current payloads for the Glazunov Exploit Kit's attacks include highly-visible PC threats like ransomware, which can block other applications and display misleading 'legal' pop-ups, as well as, in many cases, disable various security features.

Divesting the Glazunov Exploit Kit of All Possible Exploits to Use Against Your PC

Basic protections such as disabling Java, updating your software and having anti-malware products with Web-protection features all are helpful for preventing the Glazunov Exploit Kit from succeeding. Considering the predominance of Apache server-affected websites in the Glazunov Exploit Kit's campaign, SpywareRemove.com malware research team also sees some good sense in avoiding known Apache-based sites that have histories of poor security – particularly for users in the most heavily affected regions, the US and Europe.

While the Glazunov Exploit Kit, like all semi-competent EKs, does employ some methods to conceal its attacks, adequate anti-malware software should be able to detect both the Glazunov Exploit Kit and Web pages directly related to its attacks. Ransomware-based PC threats installed by the Glazunov Exploit Kit usually will need to be disabled before they can be deleted, and for such purposes, SpywareRemove.com malware researchers recommend using Safe Mode in combination with booting your PC from a flash drive-stored OS.

Technical Details

Additional Information

The following URL's were detected:
pchealthprowno1.store
Loading...