Neutrino Exploit Kit
Neutrino and its predecessor Neutrino-v are popular exploit kits that surged in mid-2016. They are known for using compromised sites and malvertising to infect users with various malware.Related Threats
Exploit Kits
Campaigns
- Operation Afraidgate^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/campaigns-details.operation-afraidgate.html
- Operation ShadowGate^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/campaigns-details.operation-shadowgate.html
- Operation ProMediads^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/campaigns-details.operation-promediads.html
Ransomware
- TeslaCrypt - Ransomware^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/ransomware-details.teslacrypt-ransomware.html
- BandarChor - Ransomware^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/ransomware-details.bandarchor-ransomware.html
- CryptoWall - Ransomware^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/ransomware-details.cryptowall-ransomware.html
- CrypMIC - Ransomware^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/ransomware-details.crypmic-ransomware.html
- Zepto - Ransomware^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/ransomware-details.zepto-ransomware.html
- Cerber - Ransomware^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/ransomware-details.cerber-ransomware.html
- Locky - Ransomware^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/ransomware-details.locky-ransomware.html
- CryptFIle2 - Ransomware^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/ransomware-details.cryptfile2-ransomware.html
- PizzaCrypts - Ransomware^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/ransomware-details.pizzacrypts-ransomware.html
- CryptXXX - Ransomware^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/ransomware-details.cryptxxx-ransomware.html
Vulnerabilities
- CVE-2016-1019^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2016-1019.html
- CVE-2015-3090 ^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2015-3090.html
- CVE-2015-0311^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2015-0311.html
- CVE-2015-5122 ^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2015-5122.html
- CVE-2013-0074 ^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2013-0074.html
- CVE-2017-0022^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2017-0022.html
- CVE-2015-7645^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2015-7645.html
- CVE-2014-6332^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2014-6332.html
- CVE-2015-2419 ^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2015-2419.html
- CVE-2015-0313^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2015-0313.html
- CVE-2013-2423^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2013-2423.html
- CVE-2016-0189^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2016-0189.html
- CVE-2015-0359 ^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2015-0359.html
- CVE-2014-0515^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2014-0515.html
- CVE-2016-7201^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2016-7201.html
- CVE-2013-7331^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2013-7331.html
- CVE-2016-7200^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2016-7200.html
- CVE-2016-3298^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2016-3298.html
- CVE-2013-2551^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2013-2551.html
- CVE-2016-4117^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2016-4117.html
- CVE-2015-5119 ^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2015-5119.html
- CVE-2015-8651 ^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2015-8651.html
- CVE-2015-3113 ^/content/enterprise/ru-ru/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2015-3113.html