The source code of the RIG Exploit Kit leaked

A hacker claiming to have developed part of the RIG Exploit Kit was disappointed when he did not normally receive his payments for malware updates and decided to leak the source code of the tool.RIG Exploit Kit hack

Initially, the hacker tried to sell RIG's services on HackForums, a website which is considered a paradise for script kiddies.

It was then written in a private underground forum where the administrators ban him, characterizing the scammer trying to trick members of the blackhat community trying to sell RIG services at very high prices.

Έτσι ο δυσαρεστημένος hacker ανέβασε τον πηγαίο κώδικα και μια ανταλλαγής περιεχομένου κοινής χρήσης και να δημιούργησε ένα on Twitter, from where he contacted different security researchers showing the link to download RIG.

At first, there was no confirmation that the leaked code was actually the RIG Exploit Kit. However, several researchers have confirmed the authenticity of the code, which is "the latest version of the package."

The RIG Exploit Kit is a popular browser-based attack tool that can be used to deploy all kinds of malware, from Trojans up to ransomware with file encryption.

Leakage does not include exploits of RIG. For this reason, the researchers who analyzed the Exploit Kit by MalwareTech, decided to release the source code to the public.

IGuRu.gr will provide the link to the source code, ONLY for research purposes. You can download the kit from the link below.

Mega.co.nz

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).