Anti-Malware Research

How Angler Exploited Silverlight

The Angler exploit kit took over from Blackhole as the tool of choice for the discerning malware writer, achieving a position of prominence among web exploit kits, not last due to the extreme variety of exploits used. While Angler doesn’t actually do zero-day exploitation, the team developing it tries to stay ahead of the defenses by developing working exploit code before possible targets actually get patched.

In this new Labs research paper, Bitdefender researcher Mihai Neagu takes an in-depth look at the Angler exploit kit code, detailing exploitation techniques and possible mitigation strategies for Silverlight:
Analysis of Angler Silverlight Exploit

About the author

Razvan STOICA

Razvan STOICA

Razvan Stoica is a journalist turned teacher turned publicist and technology evangelist. When Bitdefender isn't paying him to bring complex subjects to wide audiences, he enjoys writing fiction, skiing and biking. Razvan Stoica started off writing for a science monthly and was the chief editor of a science fiction magazine for a short while before moving on to the University of Medicine in Bucharest where he lectured on the English language. Recruited by Bitdefender in 2004 to add zest to the company's online presence, he has fulfilled a bevy of roles within the company since. In his current position, he is primarily responsible for the communications and community-building efforts of the Bitdefender research and technology development arm.