What's the threat?
Exploit kits contain a collection of automated threat programs to exploit known vulnerabilities in the systems or applications. The kits silently look for the vulnerabilities on the victim’s device and try to overtake the control of the device to download and install the loaded malware. The criminal group/s behind the recent malvertising campaigns were found to have similar motives.
Here are the four exploit kits that made the headlines:
In a separate attempt, the exploit kit installed Amadey, a trojan which is capable of stealing credentials and download and execute additional malware.
To safeguard yourself from exploit kits, the easiest and effective way is to ensure the installation of the latest security updates for both OS and any software installed on the system. Every program that interacts with a web browser to add additional functionality such as PDF Readers, Adobe flash player, and others must be updated.