Underminer Exploit Kit
The exploit kit protects its own exploit code and C2 traffic with RSA encryption and takes advantage of flaws in Microsoft Internet Explorer and Adobe Flash Player to infect users with a range of malware including crypto-miners and bootkits.Related Threats
Exploit Kits
Campaigns
Ransomware
Vulnerabilities
- CVE-2018-15982^/content/enterprise/fr-ca/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2018-15982.html
- CVE-2016-0189^/content/enterprise/fr-ca/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2016-0189.html
- CVE-2015-5119 ^/content/enterprise/fr-ca/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2015-5119.html
- CVE-2018-4878^/content/enterprise/fr-ca/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2018-4878.html
- CVE-2018-8174^/content/enterprise/fr-ca/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2018-8174.html