Phoenix Exploit Kit
Posted: April 10, 2013
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 2/10 |
---|---|
Infected PCs: | 49 |
First Seen: | April 10, 2013 |
---|---|
OS(es) Affected: | Windows |
Phoenix Exploit Kit is a package of configurable exploits that can be used to download and install malware onto the affected PC in a symptomless fashion, with these attacks usually taking the format of drive-by-download scripts that are embedded on benign but hacked websites. Although Phoenix Exploit Kit has been in the vicinity for several years, recent news implies that Phoenix Exploit Kit's development may be stunted by the arrest of its creator, a resident of Russia. While SpywareRemove.com malware researchers hold out hope that such actions will effectively block future Phoenix Exploit Kit campaigns, at this time, Phoenix Exploit Kit still appears to be an active PC threat, along with very similar exploit kits like the Sweet Orange Exploit Kit and Blackhole Exploit Kit. Website and web-browsing security should be considered central to defending against Phoenix Exploit Kit attacks, but any successful infections caused by Phoenix Exploit Kit should be extirpated by pertinent anti-malware software.
The Phoenix Exploit Kit: Hopefully Not Arising from the Ashes of Defeat
While the legendary phoenix was known to burn to death and then reincarnate periodically, the Phoenix Exploit Kit appears to be suffering from what may very well be a permanent phase of self-immolation, with its creator seemingly in the hands of Moscow's law enforcement. A man in his early twenties, Phoenix Exploit Kit's creator was reported to be apprehended in the summer of 2012, which, hopefully, has resulted in the suspended development of the Phoenix Exploit Kit.
Like most exploit kits, the Phoenix Exploit Kit operates on a rental model: the Phoenix Exploit Kit is purchased for specific periods of time (reputedly at prices of two thousand dollars). After this rental, the Phoenix Exploit Kit then used to attack various websites and deliver whatever payloads the renters wish to promote.
Although the Phoenix Exploit Kit is neither as well-distributed nor as sophisticated as top exploit kits like the Blackhole Exploit Kit, SpywareRemove.com malware experts have associated Phoenix Exploit Kit attacks with specific targets worthy of being mentioned. In particular, past campaigns by the Phoenix Exploit Kit have targeted WordPress blogging sites, inserting the relevant scripts to enable Phoenix Exploit Kit attacks whenever visitors loaded these blogs. The original compromise that allowed criminals to hack these sites appears to have been – as usual – outdated website maintenance software with exploitable vulnerabilities.
That campaign was terminated some while ago, but WordPress often is targeted by similar attacks, and exploit kits like the Phoenix Exploit Kit remain responsible for a hefty percentage of overall malware infections in the world today.
Putting a Damper on the Phoenix Exploit Kit's Smoking Remains
Because the Phoenix Exploit Kit and similar exploit kits use several points of access before their payloads, ultimately, infect your computer, SpywareRemove.com malware analysts have several defenses to recommend against any still-ongoing Phoenix Exploit Kit attacks:
- If you maintain a website, even a simple blog, you should monitor it for suspicious script insertions that could be used to redirect your traffic to any Phoenix Exploit Kit-hosting sites. As noted earlier in this article, outdated site maintenance software typically is the culprit behind these hacking attacks.
- If you browse the web regularly (and particularly if you frequent sites that are popular targets for the Phoenix Exploit Kit's attacks), your browser's security settings should be kept at high levels that can block script-based attacks and malicious sites. Many anti-malware products also include a variety of browser-protecting functions.
The Phoenix Exploit Kit is a PC threat that's hosted online and does not, normally, need to be removed from your computer. However, malware that's installed by a Phoenix Exploit Kit can be highly sophisticated and always should be removed with the most powerful anti-malware software you can access. With the above safety tips kept in mind, SpywareRemove.com malware researchers hope that, very soon, the Phoenix Exploit Kit will join the ranks of extinct species.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.