{"id":570,"date":"2016-10-03T16:08:45","date_gmt":"2016-10-03T16:08:45","guid":{"rendered":"http:\/\/www.adlice.com\/?p=570"},"modified":"2022-12-21T10:36:24","modified_gmt":"2022-12-21T10:36:24","slug":"exploit-kits-part-2","status":"publish","type":"post","link":"https:\/\/www.adlice.com\/de\/exploit-kits-part-2\/","title":{"rendered":"Exploits Monetizing, Exploit Kits (Part 2)"},"content":{"rendered":"\n<h4 class=\"has-accent-color has-text-color wp-block-heading\" id=\"h-introduction\">Introduction<\/h4>\n\n\n\n<p>As we saw in <a href=\"\/\/www.adlice.com\/exploit-kits-part-1\">Part I<\/a>, discovery and exploitation of new vulnerabilities are critical to the effectiveness of Exploit kits. In fact, Exploit kits that does not renew its exploits database will not be effective anymore and then will lose popularity and customers.<\/p>\n\n\n\n<p>For various reasons, many people are researching vulnerabilities in programs and ways to exploit them. These include fame, ethics, <strong>and of course finance<\/strong>. In this part we will see exploits monetizing, or how the operators make money.<\/p>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\" id=\"h-exploits-monetizing-legal-considerations\"><br>Exploits Monetizing: Legal considerations<\/h4>\n\n\n\n<p>It is important to note that searching for vulnerabilities in a program and publishing exploits for them is <strong>anything illegal<\/strong> (unless stated otherwise in the <a href=\"https:\/\/en.wikipedia.org\/wiki\/End-user_license_agreement\">software license agreement<\/a>. <strong>The determining factor is the use that is made of the vulnerability exploitation.<\/strong><\/p>\n\n\n\n<p>Many companies now offer <a href=\"https:\/\/en.wikipedia.org\/wiki\/Bug_bounty_program\">Bug Bounty programs<\/a>. These programs define a specific report framework and rewards (money, swag, recognition of skills, etc.) offered to security researchers.<\/p>\n\n\n\n<p>For these companies, the advantage of such programs is twofold. This allows them to<strong> encourage researchers to report vulnerabilities found via the Bug Bounty program<\/strong> rather than making them public or selling them to other organizations but to <strong>realize vulnerability tests cheaply<\/strong>.<\/p>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\" id=\"h-exploits-monetizing-legal-market\"><br>Exploits Monetizing: Legal Market<\/h4>\n\n\n\n<p>Some companies specialize in buying and selling exploits, <strong>often offering much higher purchase prices than those of Bug Bounty programs<\/strong>.<\/p>\n\n\n\n<p>These include the service \u201cAbsolute Zero-Day\u201d operated by <a href=\"https:\/\/en.wikipedia.org\/wiki\/Kevin_Mitnick\">Kevin Mitnick<\/a>, which links exploits developers and potential buyers. The service only considers exploits with a CVSS score of a minimum value of 8 and on popular software (see <a href=\"\/\/www.adlice.com\/exploit-kits-part-1\">Part I<\/a>).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/Mitnick_Absolute.png\"><img decoding=\"async\" width=\"300\" height=\"45\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/Mitnick_Absolute-300x45.png\" alt=\"Mitnick's Absolute Zero-Day\" class=\"wp-image-563\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/Mitnick_Absolute-300x45.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/Mitnick_Absolute.png 834w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>Dealers must be qualified to access the service. For this, high registration fees must be paid by sellers and buyers. For the latter, further investigations are carried out. According to Mitnick, a single exploit is sold at the minimum price of <strong>$100,000 USD<\/strong>, and their clients include governments and major corporations.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/zerodium_prices.png\"><img decoding=\"async\" width=\"906\" height=\"602\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/zerodium_prices.png\" alt=\"exploits payout\" class=\"wp-image-564\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/zerodium_prices.png 906w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/zerodium_prices-300x199.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/zerodium_prices-330x220.png 330w\" sizes=\"(max-width: 906px) 100vw, 906px\" \/><\/a><figcaption class=\"wp-element-caption\">Source : zerodium.com<\/figcaption><\/figure>\n<\/div>\n\n\n<p>Unlike the \u201cAbsolute Zero-Day\u201d service, exploits developers do not need to be qualified. Regarding their customers, ZERODIUM only accepts major companies in the fields of Defence, Finance, Technology, and government agencies.<\/p>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\" id=\"h-black-market\"><br>Black Market<\/h4>\n\n\n\n<p>As we have seen above,<strong> it is very difficult or impossible to buy exploits from these companies<\/strong>. Therefore alternative exchange places emerged.<\/p>\n\n\n\n<p>Most of the time, these places are <strong>private or semi-private forum<\/strong> where it is possible for anyone, for a fee, to buy 0-day exploits but also Exploit Kit, hacking tools, etc.<\/p>\n\n\n\n<p>An example is the private forum Darklife. To access it, it\u2019s necessary to be invited or to pay $100 USD. Once connected and checked, it is possible to access the different sections of the forum:<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"644\" height=\"431\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/DarkLife_invite.png\" alt=\"DarkLife Invitation Form for exploit\" class=\"wp-image-565\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/DarkLife_invite.png 644w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/DarkLife_invite-300x201.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/DarkLife_invite-330x220.png 330w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"643\" height=\"504\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/DarkLife_logged.png\" alt=\"DarkLife Forum for exploits\" class=\"wp-image-566\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/DarkLife_logged.png 643w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/DarkLife_logged-300x235.png 300w\" sizes=\"(max-width: 643px) 100vw, 643px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>Another example on the forum exploit.in, where user BuggyCorp offers 0-day exploit (privileges escalation)<strong> working on all versions of Windows for $90,000 USD<\/strong>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/BuggyCorp.png\"><img decoding=\"async\" width=\"300\" height=\"129\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/BuggyCorp-300x129.png\" alt=\"BuggyCorp selling exploit\" class=\"wp-image-567\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/BuggyCorp-300x129.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/BuggyCorp-1024x440.png 1024w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/09\/BuggyCorp.png 1890w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>A video showing the effectiveness of the exploit despite the presence of the EMET tool (see <a href=\"https:\/\/www.adlice.com\/exploit-kits-part-1\">Part I<\/a>) is also included.<\/p>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\" id=\"h-transaction-exemple\"><br>Transaction exemple<\/h4>\n\n\n\n<p>We will study here a transaction between the Russian hacker Vitaliy Toropov and company <a href=\"https:\/\/en.wikipedia.org\/wiki\/Hacking_Team\">Hacking Team<\/a>, which specializes in selling software for spying and surveillance.<\/p>\n\n\n\n<p><strong>On October 13 2013<\/strong>, Vitaliy Toropov initiates contact with the company and offers to sell them six exploits for Windows, Java, Flash Player and Safari, <strong>for a price of $30.000 to $45.000 USD per exploit<\/strong>.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Hi, is your company interested in buying zero-day vulnerabilities with RCE exploits for the latest versions of Flash Player, Silverlight, Java, Safari?<\/p>\n\n\n\n<p>All exploits allow to embed and remote execute custom payloads and demonstrate modern techniques for bypassing ASLR and DEP-like protections on Windows, OS X, and iOS without using of unreliable ROP and heap sprays.<\/p>\n<\/blockquote>\n\n\n\n<p>The company is only interested in the exploit for Flash Player. <strong>On 25 October<\/strong>, an agreement is made between Toropov and Hacking Team, whose clauses are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The price is set at $45,000 USD for a non-exclusive sale and includes a discount on future exploits<\/li>\n\n\n\n<li>Sources of the exploit are shared, and three days of testing are planned<\/li>\n\n\n\n<li>Payment will be made in three parts : $20,000, $15,000 and $10,000 USD<\/li>\n\n\n\n<li>Payment can be interrupted if the vulnerability is patched by the software vendor<\/li>\n\n\n\n<li>Hacking Team is committed to not report the vulnerability to the software vendor<\/li>\n<\/ul>\n\n\n\n<p><strong>On October 29<\/strong>, Hacking Team testes the exploit and on October 30, Toropov receives the first part of the payment. It is latter specified that the discount will be of $5,000 USD for the second deal and $10,000 USD for the third one.<\/p>\n\n\n\n<p>In total, Hacking Team bought for a minimum known amount of <strong>$84,000 USD exploits<\/strong> to Vitaliy Toropov.<\/p>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\" id=\"h-conclusion\"><br>Conclusion<\/h4>\n\n\n\n<p>It is perfectly legal to search for vulnerabilities and exploits for them. Software vendors have realized this and developed Bug Bounty programs. However, these programs cannot compete in financial terms with companies and specialized platforms in the resale of exploits. It is therefore unlikely to see them disappear in a short or medium timespan.<\/p>\n\n\n\n<p>As we have seen with the transaction between Vitaliy Toropov and Hacking Team company,<strong> acquiring an exploit is made under strict conditions<\/strong> (customer commitment, exploit test, guarantee measures, etc.) <strong>even on the parallel market<\/strong>, ensuring both the interests of the developer and the client.<\/p>\n\n\n\n<p>It is thus possible to consider that some companies don\u2019t hesitate to carry out such transactions, to more or less laudable reasons.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover the inner working of the places where transactions between exploits dealers take place and the conditions of such transactions.<\/p>\n","protected":false},"author":1,"featured_media":271,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36,1],"tags":[461,460,339,463],"class_list":["post-570","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analysis","category-uncategorized","tag-black-market","tag-bug-bounty-2","tag-vulnerabilities","tag-vulnerability","category-36","category-1","description-off"],"views":2335,"yoast_score":76,"yoast_readable":90,"featured_image_src":"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg","author_info":{"display_name":"tigzy","author_link":"https:\/\/www.adlice.com\/de\/author\/tigzy\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Exploits Monetizing, Exploit Kits (Part 2) \u2022 Adlice Software<\/title>\n<meta name=\"description\" content=\"Exploit kits play a major role in the spread of malware. Exploits Monetizing. Learn how the operators make money.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adlice.com\/exploit-kits-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exploits Monetizing, Exploit Kits (Part 2) \u2022 Adlice Software\" \/>\n<meta property=\"og:description\" content=\"Exploit kits play a major role in the spread of malware. Exploits Monetizing. Learn how the operators make money.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adlice.com\/exploit-kits-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Adlice Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RogueKiller\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-03T16:08:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-21T10:36:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1317\" \/>\n\t<meta property=\"og:image:height\" content=\"786\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tigzy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:site\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"tigzy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.adlice.com\/exploit-kits-part-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/exploit-kits-part-2\/\"},\"author\":{\"name\":\"tigzy\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\"},\"headline\":\"Exploits Monetizing, Exploit Kits (Part 2)\",\"datePublished\":\"2016-10-03T16:08:45+00:00\",\"dateModified\":\"2022-12-21T10:36:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/exploit-kits-part-2\/\"},\"wordCount\":860,\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/exploit-kits-part-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg\",\"keywords\":[\"black market\",\"bug bounty\",\"vulnerabilities\",\"vulnerability\"],\"articleSection\":[\"Analysis\",\"Uncategorized\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.adlice.com\/exploit-kits-part-2\/\",\"url\":\"https:\/\/www.adlice.com\/exploit-kits-part-2\/\",\"name\":\"Exploits Monetizing, Exploit Kits (Part 2) \u2022 Adlice Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/exploit-kits-part-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/exploit-kits-part-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg\",\"datePublished\":\"2016-10-03T16:08:45+00:00\",\"dateModified\":\"2022-12-21T10:36:24+00:00\",\"description\":\"Exploit kits play a major role in the spread of malware. Exploits Monetizing. Learn how the operators make money.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.adlice.com\/exploit-kits-part-2\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.adlice.com\/exploit-kits-part-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.adlice.com\/exploit-kits-part-2\/#primaryimage\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg\",\"width\":1317,\"height\":786},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.adlice.com\/exploit-kits-part-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.adlice.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exploits Monetizing, Exploit Kits (Part 2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.adlice.com\/#website\",\"url\":\"https:\/\/www.adlice.com\/\",\"name\":\"Adlice Software\",\"description\":\"Anti-malware and analysis tools\",\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.adlice.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.adlice.com\/#organization\",\"name\":\"Adlice Software\",\"url\":\"https:\/\/www.adlice.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"width\":276,\"height\":276,\"caption\":\"Adlice Software\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RogueKiller\",\"https:\/\/x.com\/AdliceSoftware\",\"https:\/\/fr.linkedin.com\/company\/adlice-software\",\"https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\",\"name\":\"tigzy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"caption\":\"tigzy\"},\"description\":\"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.\",\"url\":\"https:\/\/www.adlice.com\/de\/author\/tigzy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exploits Monetizing, Exploit Kits (Part 2) \u2022 Adlice Software","description":"Exploit kits play a major role in the spread of malware. Exploits Monetizing. Learn how the operators make money.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adlice.com\/exploit-kits-part-2\/","og_locale":"de_DE","og_type":"article","og_title":"Exploits Monetizing, Exploit Kits (Part 2) \u2022 Adlice Software","og_description":"Exploit kits play a major role in the spread of malware. Exploits Monetizing. Learn how the operators make money.","og_url":"https:\/\/www.adlice.com\/exploit-kits-part-2\/","og_site_name":"Adlice Software","article_publisher":"https:\/\/www.facebook.com\/RogueKiller","article_published_time":"2016-10-03T16:08:45+00:00","article_modified_time":"2022-12-21T10:36:24+00:00","og_image":[{"width":1317,"height":786,"url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg","type":"image\/jpeg"}],"author":"tigzy","twitter_card":"summary_large_image","twitter_creator":"@AdliceSoftware","twitter_site":"@AdliceSoftware","twitter_misc":{"Verfasst von":"tigzy","Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.adlice.com\/exploit-kits-part-2\/#article","isPartOf":{"@id":"https:\/\/www.adlice.com\/exploit-kits-part-2\/"},"author":{"name":"tigzy","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d"},"headline":"Exploits Monetizing, Exploit Kits (Part 2)","datePublished":"2016-10-03T16:08:45+00:00","dateModified":"2022-12-21T10:36:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.adlice.com\/exploit-kits-part-2\/"},"wordCount":860,"publisher":{"@id":"https:\/\/www.adlice.com\/#organization"},"image":{"@id":"https:\/\/www.adlice.com\/exploit-kits-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg","keywords":["black market","bug bounty","vulnerabilities","vulnerability"],"articleSection":["Analysis","Uncategorized"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.adlice.com\/exploit-kits-part-2\/","url":"https:\/\/www.adlice.com\/exploit-kits-part-2\/","name":"Exploits Monetizing, Exploit Kits (Part 2) \u2022 Adlice Software","isPartOf":{"@id":"https:\/\/www.adlice.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.adlice.com\/exploit-kits-part-2\/#primaryimage"},"image":{"@id":"https:\/\/www.adlice.com\/exploit-kits-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg","datePublished":"2016-10-03T16:08:45+00:00","dateModified":"2022-12-21T10:36:24+00:00","description":"Exploit kits play a major role in the spread of malware. Exploits Monetizing. Learn how the operators make money.","breadcrumb":{"@id":"https:\/\/www.adlice.com\/exploit-kits-part-2\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adlice.com\/exploit-kits-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.adlice.com\/exploit-kits-part-2\/#primaryimage","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2014\/10\/malware.jpg","width":1317,"height":786},{"@type":"BreadcrumbList","@id":"https:\/\/www.adlice.com\/exploit-kits-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adlice.com\/de\/"},{"@type":"ListItem","position":2,"name":"Exploits Monetizing, Exploit Kits (Part 2)"}]},{"@type":"WebSite","@id":"https:\/\/www.adlice.com\/#website","url":"https:\/\/www.adlice.com\/","name":"Adlice Software","description":"Anti-malware and analysis tools","publisher":{"@id":"https:\/\/www.adlice.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adlice.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.adlice.com\/#organization","name":"Adlice Software","url":"https:\/\/www.adlice.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","width":276,"height":276,"caption":"Adlice Software"},"image":{"@id":"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RogueKiller","https:\/\/x.com\/AdliceSoftware","https:\/\/fr.linkedin.com\/company\/adlice-software","https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ"]},{"@type":"Person","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d","name":"tigzy","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","caption":"tigzy"},"description":"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.","url":"https:\/\/www.adlice.com\/de\/author\/tigzy\/"}]}},"_links":{"self":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/posts\/570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/comments?post=570"}],"version-history":[{"count":0,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/posts\/570\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/media\/271"}],"wp:attachment":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/media?parent=570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/categories?post=570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/tags?post=570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}