- Kamis, 26 May 2016
- Penulis: Nick Biasini, Talos blog (Cisco)
It's been awhile since we've discussed Nuclear so let's start with an
overview of how users are infected. Like most exploit kits it has a
couple of key components: a gate, a landing page, and an exploit page
with payload. Let's start by describing the gate that we have been
observing associated with Nuclear and specifically this instance
associated to a novel payload.