Phony CloudFlare DDoS page redirects victims to Nuclear EK

SC Magazine logo, red background, bold letters.

SC Magazine

CloudFlare DDoS check page as a Nuclear exploit kit (EK) gate to load a malicious redirection that ultimately triggers the EK, Malwarebytes Security Researcher Jerome Segura said in a blog post, “Upon further check, the server’s IP address is clearly visible and does not belong to CloudFlare at all. Our Principal Sales Engineer and Technical Expert Stephen Gates said that the phony page could backfire for the threat actors. To read the full article, please click here.

 

photo

NSFOCUS
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.