The source code of the RIG Exploit Kit leaked

A hacker who claims to have developed part of RIG Kit, became unhappy when he was not regularly receiving his payments for malware updates, and decided to leak the tool's source code.RIG Exploit Kit hack

Originally, the hacker tried to sell RIG's services to HackForums, a site that is considered a paradise for script kiddies.

It was then written in a private underground forum where the administrators ban him, characterizing the scammer trying to trick members of the blackhat community trying to sell RIG services at very high prices.

So the unhappy hacker raised the source code and a sharing content sharing website and created a Twitter account from where he came in contact with different security researchers by showing the link to downloading RIG.

At first, there was no confirmation that the leaked code was actually the RIG Exploit Kit. However, several researchers have confirmed the authenticity of the code, which is "the latest version of the package."

The RIG Exploit Kit είναι ένα δημοφιλή browser-based εργαλείο επίθεσης που μπορεί να χρησιμοποιηθεί για την διάθεση όλων των ειδών των malware, από banking Trojans μέχρι ransomware με of files.

Leakage does not include exploits of RIG. For this reason, the researchers who analyzed the Exploit Kit by MalwareTech, decided to release the source code to the public.

IGuRu.gr will provide the link to the source code, ONLY for research purposes. You can download the kit from the link below.

Mega.co.nz

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).