Exploit kits are frequently used to deliver malware payloads onto victim systems. Clicking a malicious link in a phishing email, visiting a compromised site, or malvertising on a legitimate site are among the techniques most commonly used by threat actors to lead victims to exploit kit (EK) servers. In late August, Proofpoint researchers detected an infection attempt via malvertising that showed just how popular these services can be with threat actors.
- Lucy Harvey
- Case Studies
- Posted On




