modify SedKit description

pull/142/head
Deborah Servili 2017-12-22 10:08:54 +01:00
parent e787efce72
commit f737b7fe0a
1 changed files with 1 additions and 1 deletions

View File

@ -3230,7 +3230,7 @@
},
{
"value": "Sedkit",
"description": "Sedkit was an exploit kit used exclusively by the Sednit group. During its lifetime, Sednit leveraged vulnerabilities in various persistently vulnerable applications, but mostly Adobe Flash and Internet Explorer. When Sedkit was first discovered, potential victims were redirected to its landing page through a watering-hole scheme. Following that campaign, their preferred method consisted of malicious links embedded in emails sent to Sednits targets. Sedkits workflow is illustrated below.",
"description": "Sedkit is the Sednit exploit-kit; its used only for targeted attacks, starting with targeted phishing emails with URLs that spoof legitimate URLs. October 2016 is the last time were aware that Sedkit was used.",
"meta": {
"refs": [
"https://www.welivesecurity.com/2014/10/08/sednit-espionage-group-now-using-custom-exploit-kit/",