G.A.
05-24-2013, 07:55 AM
i just clicked on the link up top right on page for the delux wall tent gys..my antivirus just stopped a bug from hitting my system.
its called an: exploit blackhole exploit kit( type2602
object name: sarafan.home.pl/counter.php
The Blackhole exploit kit is currently the most prevalent web threat, where 28% of all web threats detected by sophos and 91% by avg are due to this exploit kit. Its purpose is to deliver a malicious payload to a victim's computer.The supposedly Russian creators use the names "HodLuM" and "Paunch".
The customer licenses the Blackhole exploit kit from the authors and specifies various options to customize the kit.
A potential victim loads a compromised web page or opens a malicious link in a spammed email.
The compromised web page or malicious link in the spammed email sends the user to a Blackhole exploit kit server's landing page.
This landing page contains obfuscated JavaScript (http://en.wikipedia.org/wiki/JavaScript) that determines what is on the victim's computers and loads all exploits to which this computer is vulnerable and sometimes a Java (http://en.wikipedia.org/wiki/Java) applet (http://en.wikipedia.org/wiki/Applet) tag that loads a Java Trojan horse.
If there is an exploit that is usable, the exploit loads and executes a payload on the victim's computer and informs the Blackhole exploit kit server which exploit was used to load the payload.
its called an: exploit blackhole exploit kit( type2602
object name: sarafan.home.pl/counter.php
The Blackhole exploit kit is currently the most prevalent web threat, where 28% of all web threats detected by sophos and 91% by avg are due to this exploit kit. Its purpose is to deliver a malicious payload to a victim's computer.The supposedly Russian creators use the names "HodLuM" and "Paunch".
The customer licenses the Blackhole exploit kit from the authors and specifies various options to customize the kit.
A potential victim loads a compromised web page or opens a malicious link in a spammed email.
The compromised web page or malicious link in the spammed email sends the user to a Blackhole exploit kit server's landing page.
This landing page contains obfuscated JavaScript (http://en.wikipedia.org/wiki/JavaScript) that determines what is on the victim's computers and loads all exploits to which this computer is vulnerable and sometimes a Java (http://en.wikipedia.org/wiki/Java) applet (http://en.wikipedia.org/wiki/Applet) tag that loads a Java Trojan horse.
If there is an exploit that is usable, the exploit loads and executes a payload on the victim's computer and informs the Blackhole exploit kit server which exploit was used to load the payload.