Home Malware Programs Malware Phoenix Exploit Kit

Phoenix Exploit Kit

Posted: April 10, 2013

Threat Metric

Threat Level: 2/10
Infected PCs: 49
First Seen: April 10, 2013
OS(es) Affected: Windows

Phoenix Exploit Kit is a package of configurable exploits that can be used to download and install malware onto the affected PC in a symptomless fashion, with these attacks usually taking the format of drive-by-download scripts that are embedded on benign but hacked websites. Although Phoenix Exploit Kit has been in the vicinity for several years, recent news implies that Phoenix Exploit Kit's development may be stunted by the arrest of its creator, a resident of Russia. While SpywareRemove.com malware researchers hold out hope that such actions will effectively block future Phoenix Exploit Kit campaigns, at this time, Phoenix Exploit Kit still appears to be an active PC threat, along with very similar exploit kits like the Sweet Orange Exploit Kit and Blackhole Exploit Kit. Website and web-browsing security should be considered central to defending against Phoenix Exploit Kit attacks, but any successful infections caused by Phoenix Exploit Kit should be extirpated by pertinent anti-malware software.

The Phoenix Exploit Kit: Hopefully Not Arising from the Ashes of Defeat

While the legendary phoenix was known to burn to death and then reincarnate periodically, the Phoenix Exploit Kit appears to be suffering from what may very well be a permanent phase of self-immolation, with its creator seemingly in the hands of Moscow's law enforcement. A man in his early twenties, Phoenix Exploit Kit's creator was reported to be apprehended in the summer of 2012, which, hopefully, has resulted in the suspended development of the Phoenix Exploit Kit.

Like most exploit kits, the Phoenix Exploit Kit operates on a rental model: the Phoenix Exploit Kit is purchased for specific periods of time (reputedly at prices of two thousand dollars). After this rental, the Phoenix Exploit Kit then used to attack various websites and deliver whatever payloads the renters wish to promote.

Although the Phoenix Exploit Kit is neither as well-distributed nor as sophisticated as top exploit kits like the Blackhole Exploit Kit, SpywareRemove.com malware experts have associated Phoenix Exploit Kit attacks with specific targets worthy of being mentioned. In particular, past campaigns by the Phoenix Exploit Kit have targeted WordPress blogging sites, inserting the relevant scripts to enable Phoenix Exploit Kit attacks whenever visitors loaded these blogs. The original compromise that allowed criminals to hack these sites appears to have been – as usual – outdated website maintenance software with exploitable vulnerabilities.

That campaign was terminated some while ago, but WordPress often is targeted by similar attacks, and exploit kits like the Phoenix Exploit Kit remain responsible for a hefty percentage of overall malware infections in the world today.

Putting a Damper on the Phoenix Exploit Kit's Smoking Remains

Because the Phoenix Exploit Kit and similar exploit kits use several points of access before their payloads, ultimately, infect your computer, SpywareRemove.com malware analysts have several defenses to recommend against any still-ongoing Phoenix Exploit Kit attacks:

  • If you maintain a website, even a simple blog, you should monitor it for suspicious script insertions that could be used to redirect your traffic to any Phoenix Exploit Kit-hosting sites. As noted earlier in this article, outdated site maintenance software typically is the culprit behind these hacking attacks.
  • If you browse the web regularly (and particularly if you frequent sites that are popular targets for the Phoenix Exploit Kit's attacks), your browser's security settings should be kept at high levels that can block script-based attacks and malicious sites. Many anti-malware products also include a variety of browser-protecting functions.

The Phoenix Exploit Kit is a PC threat that's hosted online and does not, normally, need to be removed from your computer. However, malware that's installed by a Phoenix Exploit Kit can be highly sophisticated and always should be removed with the most powerful anti-malware software you can access. With the above safety tips kept in mind, SpywareRemove.com malware researchers hope that, very soon, the Phoenix Exploit Kit will join the ranks of extinct species.

Technical Details

Additional Information

The following URL's were detected:
bousthane.com
Loading...