By Matthew Hines
eWEEK Security Watch
July 29, 2008
Researchers at RSA's FraudAction Research Lab are reporting that the
group behind the Neosploit malware infection tool kit may have thrown in
the towel, which, if true, means an end to one of the badware industry's
most successful and high-profile business ventures thus far.
It's hard to pinpoint exactly when researchers first noticed the malware
development framework being sold on underground bulletin boards, but
Neosploit has been around for at least the last two years or so.
And, as RSA experts point out, based on its ease of use, wide
availability and relatively low buy-in cost (it's typically offered for
between $1,500 and $3,000) the tool kit has become one of the most
popular framework-driven means of launching malware attacks over the
course of its run.
More importantly, Neosploit paved the way for other professional-grade
malware tool kits such as the MPack and IcePack frameworks, among
others, with the manner in which it was marketed as a professionally
supported product, offering active customer service and code updates
just as companies provide for their legitimate software programs.
Attend Black Hat USA, August 2-7 in Las Vegas,
the world's premier technical event for ICT security experts.
Featuring 40 hands-on training courses and 80 Briefings
presentations with lots of new content and new tools.
Network with 4,000 delegates from 50 nations.
Visit product displays by 30 top sponsors in
a relaxed setting. http://www.blackhat.com