June 14, 2016 By Larry Loeb 2 min read

The Angler exploit kit (EK), which has been widely used by the cybercriminal world especially for malvertising campaigns, seems to be kaput.

Security researchers found that the traffic attributed to Angler use nose-dived in the last few weeks. The slack seems to be picked up by an increased use of the Neutrino exploit kit.

The SANS ISC Infosec Forum also noted that CryptXXX is starting to show up as a Neutrino-associated malware, something that researchers hadn’t seen before. It seems that there is a demonstrable shift in malware distribution occurring.

Neutrino’s Stock Goes Up

The Neutrino EK is stepping up as the Angler EK goes down. Malware don’t need Coffee said that Neutrino just doubled its price on the underground market, going from $3,500 per month to $7,000. It also dropped its weekly rental option in favor of more lucrative packages. That seems to indicate the Neutrino operators feel they are in a good position to negotiate — for now.

Of course, increased Neutrino traffic can only raise its profile as a target, and it’s a target that will loom large on Neutrino’s back the more it gets used. In the meantime, admins will likely try to grab as much money as they can while the competition is down and they are up.

But a question remains for all kinds of these episodes: For how long will Angler be down? EKs have shut down in the past when the malware administrator was away or had run-ins with police or other authorities. This could be a possibility for Angler as well.

Connecting the Angler Exploit Kit and Lurk Arrests

Malware don’t need Coffee noted that the Angler downtime may be related to the arrests of a Russian hacking gang believed to be behind a Trojan called Lurk. “With the recent 50 arrests tied to Lurk in mind, and knowing the infection vector for Lurk was the Indexm variant of Angler between 2012 and beginning of 2016 … we might think there is a connection and that some actors are stepping back,” researchers wrote on the blog.

Correlation is not causality, but that kind of link is both long-term and significant. It seems reasonable that the cybercriminals behind Lurk could have been running the EK. After the takedown, all the EK help may have relocated for its own protection.

Someone will likely try to bring the Angler exploit kit back someday, but it won’t be an easy trick to pull off. Until then, it’s time for researchers to turn their attention to Neutrino and other EKs that are ready to take off.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today