This commit is contained in:
Beth Levin
2018-07-30 08:33:39 -07:00
parent bcc52aef2e
commit 22292161b2
2 changed files with 5 additions and 3 deletions

View File

@ -24,7 +24,7 @@ The most common method used by attackers to distribute exploits and exploit kits
The infographic below shows how an exploit kit might attempt to exploit a PC when a compromised webpage is visited. The infographic below shows how an exploit kit might attempt to exploit a PC when a compromised webpage is visited.
![example of how exploit kits work](./images/exploitkit.png) ![example of how exploit kits work](./images/ExploitKit.png)
*Example of how exploit kits work* *Example of how exploit kits work*
@ -32,7 +32,9 @@ Several notable threats, including Wannacry, exploit the Server Message Block (S
Prevalent exploit kits include: Prevalent exploit kits include:
- Angler / [Axpergle](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=JS%2fAxpergle) - Angler / [Axpergle](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=JS%2fAxpergle)
- [Neutrino](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=JS%2fNeutrino) - [Neutrino](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=JS%2fNeutrino)
- [Nuclear](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=Exploit:JS/Neclu) - [Nuclear](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=Exploit:JS/Neclu)
## How we name exploits ## How we name exploits
@ -48,4 +50,4 @@ You can read more on the [CVE website](https://cve.mitre.org/).
The best prevention for exploits is to keep your organization's software up-to-date. Software vendors provide updates for many known vulnerabilities and making sure these updates are applied to all devices is an important step to prevent malware. The best prevention for exploits is to keep your organization's software up-to-date. Software vendors provide updates for many known vulnerabilities and making sure these updates are applied to all devices is an important step to prevent malware.
For more general tips, see [prevent malware infection](prevent-malware-infection). For more general tips, see [prevent malware infection](prevent-malware-infection.md).

View File

@ -48,4 +48,4 @@ We've seen macro malware download threats from the following families:
- Delete any emails from unknown people or with suspicious content. Spam emails are the main way macro malware spreads. - Delete any emails from unknown people or with suspicious content. Spam emails are the main way macro malware spreads.
For more general tips, see [prevent malware infection](prevent-malware-infection). For more general tips, see [prevent malware infection](prevent-malware-infection.md).