Phony CloudFlare DDoS page redirects victims to Nuclear EK

Phony CloudFlare DDoS page redirects victims to Nuclear EK

February 18, 2016 | NSFOCUS

SC Magazine

CloudFlare DDoS check page as a Nuclear exploit kit (EK) gate to load a malicious redirection that ultimately triggers the EK, Malwarebytes Security Researcher Jerome Segura said in a blog post, “Upon further check, the server’s IP address is clearly visible and does not belong to CloudFlare at all. Our Principal Sales Engineer and Technical Expert Stephen Gates said that the phony page could backfire for the threat actors. To read the full article, please click here.

 

photo