Black Hole Malware: Updated Features

Security Binary DataAccording to Security, a new Black Hole Exploit Kit (malware that has been “packaged” so that the cyber criminal could easily operate it without an IT staff, and more importantly so that he doesn’t have to program his own malware) has been released. “ Black Hole is one of the most popular exploit kits on the Web, accounting for nearly 40 percent of all toolkits detected on the Web by security firm AVG Technologies in the first quarter of 2012.”

Black Hole is capable of delivering multiple malware, including the Zeus banking trojan, to unsuspecting computer users via the Internet.

The release was announced by way of an advertisement for the newest version of the kit; which “states that the prices for the kit range from [US]$50 to rent for a day and [US]$1,500 to license for a year.”

The main changes to the malware kit were to “harden” their protection against anti-malware researchers from companies like McAfee, Norton, and others. They also strengthened their login page to prevent attacks.

Does anyone else see the irony in the above paragraph? One of the most dangerous for-sale malware kits known to man is concerned about its own security and potential white hat break-ins. I’m constantly amazed at the outrageousness of the Internet Security world we live in.

Reference: Security article

As always, I appreciate your comments on this subject…so please do. And be careful out there…it’s extremely dangerous these days.

Don’t miss an article. If you enter your email address in the Email Subscriptions box on the right column of this page, I’ll send you an email when a new article is posted. I don’t share your email address with anyone…no one; I hate spam too. Please share my site with your friends and family. Thanks.

Home computing is a blast…keep it safe, productive and enjoyable.

Best regards,


lubicp(at) and if you twitter, follow me @paulsinternet on Twitter.


Leave a comment

Filed under Cybercrime, In the News, Internet, Internet Security, malware, security

What do you think?

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s