{"id":50416,"date":"2016-06-10T16:04:28","date_gmt":"2016-06-10T23:04:28","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=50416"},"modified":"2025-06-06T01:59:56","modified_gmt":"2025-06-06T08:59:56","slug":"thrones-jon-snow-appears-to-employ-neutrino-exploit-kit","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/","title":{"rendered":"&#8216;Thrones&#8217; Jon Snow Appears to Employ Neutrino Exploit Kit"},"content":{"rendered":"<p><em>This blog post was written by Kalpesh Mantri.<\/em><\/p>\n<p>You read that right. Jon Snow appears to be back from the dead. That would make &#8220;Game of Thrones&#8221; fans happy, but unfortunately this Jon Snow is not the same character. This John (with an <em>h)\u00a0<\/em>Snow is related to Neutrino exploit kits, one of the commonly used kits used for malware distribution.<\/p>\n<p>Neutrino was first identified in 2013, just months after the kits Angler and Magnitude. Today Neutrino is the second most used kit and is growing very fast. Neutrino usually employs Java exploits to start its attacks. Last month, however, Neutrino was seen using Flash exploits based on CVE-2016-4117.<\/p>\n<p>Recently, the CryptXXX ransomware switched its distribution from the Angler to Neutrino for\u00a0the\u00a0first time. Both the <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/seeing-darkleech-obfuscation-quick-hack-iframes\/\" target=\"_blank\" rel=\"noopener\">pseudo-Darkleech<\/a> and the EITest ransomware campaigns use Neutrino to deliver\u00a0CryptXXX, suggesting that Neutrino will grow rapidly in coming months.<\/p>\n<p>Recently, McAfee Labs has\u00a0found many Neutrino-redirecting URLs using .top domain extensions.<\/p>\n<ul>\n<li style=\"text-align: left;\">hxxp:\/\/eilong.top<\/li>\n<li style=\"text-align: left;\">hxxp:\/\/eaautomatic.top<\/li>\n<li style=\"text-align: left;\">hxxp:\/\/d2ahave.top<\/li>\n<\/ul>\n<p>We checked domain information for a few of those sites. By comparing\u00a0that data, we found that all of the domains were registered by a\u00a0threat actor using the (likely fake) name John Snow.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-50426 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/kkm_b2_whois_jonSnow.jpg\" alt=\"kkm_b2_whois_jonSnow\" width=\"672\" height=\"660\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/kkm_b2_whois_jonSnow.jpg 672w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/kkm_b2_whois_jonSnow-300x295.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/kkm_b2_whois_jonSnow-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/kkm_b2_whois_jonSnow-64x64.jpg 64w\" sizes=\"auto, (max-width: 672px) 100vw, 672px\" \/><\/p>\n<p>&#8220;Jon Snow&#8221; is quite popular these days due to the appeal\u00a0of &#8220;Game of Thrones.&#8221; Perhaps this threat actor is also a\u00a0fan of the show. This actor used the email address ivkolyvan@gmail.com\u00a0to register these domains through Alpnames Limited.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-50422 aligncenter\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/kkm_b2_neutrino_cnt-300x77.jpg\" alt=\"kkm_b2_neutrino_cnt\" width=\"300\" height=\"77\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/kkm_b2_neutrino_cnt-300x77.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/kkm_b2_neutrino_cnt.jpg 425w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>We found more than 700 domains with .top extensions registered by this actor, and most are used as Neutrino URLs. In the past month, this threat actor has registered more than 10 Neutrino domains daily.<\/p>\n<p>As fans of &#8220;Game of Thrones,&#8221; we looked for other\u00a0character names from the\u00a0show. Guess whom we found?<\/p>\n<p>One threat actor registered many .top domains using the name <em>Tyrion Lannister<\/em> with the email c0rleone@bk.ru. We could not determine the purpose or kits used with these domains.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-50427 aligncenter\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/kkm_b2_whois_tyrion.jpg\" alt=\"kkm_b2_whois_tyrion\" width=\"276\" height=\"157\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Apart from these &#8220;Thrones&#8221; characters, we found a few more threat actors. One, Mayko Evgeniy, used the address maykoe@list.ru\u00a0to register more than 3,800 .top domains.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-50419 aligncenter\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/kkm_b2_angler_cnt-300x76.jpg\" alt=\"kkm_b2_angler_cnt\" width=\"300\" height=\"76\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/kkm_b2_angler_cnt-300x76.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/kkm_b2_angler_cnt.jpg 437w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>This threat actor set up most domains as Angler kit URLs. This email address also registered more than 20 domains per day for the use of kits.<\/p>\n<p>We gathered a few more mail IDs used for domain name registration. The following were used for malware distribution:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-50431 size-full aligncenter\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/kkm_b2_mails.jpg\" alt=\"kkm_b2_mails\" width=\"495\" height=\"255\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/kkm_b2_mails.jpg 495w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/kkm_b2_mails-300x155.jpg 300w\" sizes=\"auto, (max-width: 495px) 100vw, 495px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Based on exploit kit tracking information from the Advanced Threat Research team of McAfee, the following are the most dominant exploit kits in the last 90 days:<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-50520 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/kkm_b2_Ek_Details.jpg\" alt=\"kkm_b2_Ek_Details\" width=\"618\" height=\"166\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/kkm_b2_Ek_Details.jpg 618w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/kkm_b2_Ek_Details-300x81.jpg 300w\" sizes=\"auto, (max-width: 618px) 100vw, 618px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Security Tip<\/strong><\/h2>\n<p>Many exploit kits are using domains with .top and .tk extensions.<\/p>\n<ul>\n<li style=\"text-align: left;\">hxxp:\/\/biolexa.tk<\/li>\n<li style=\"text-align: left;\">hxxp:\/\/x79.tx7pck9cx.top<\/li>\n<\/ul>\n<p>Organizations and individuals\u00a0can\u00a0block all access to every domain with a .top or .tk extension by configuring emails and firewalls. <a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160609_mal_domains.xlsx\" target=\"_blank\" rel=\"noopener\">Check here<\/a>\u00a0for a complete list of malicious domains found by McAfee.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog post was written by Kalpesh Mantri. You read that right. Jon Snow appears to be back from the&#8230;<\/p>\n","protected":false},"author":695,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,76,4452,338,180],"coauthors":[4136],"class_list":["post-50416","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybercrime","tag-cybersecurity","tag-endpoint-protection","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>&#039;Thrones&#039; Jon Snow Appears to Employ Neutrino Exploit Kit | McAfee Blog<\/title>\n<meta name=\"description\" content=\"This blog post was written by Kalpesh Mantri. You read that right. Jon Snow appears to be back from the dead. That would make &quot;Game of Thrones&quot; fans\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&#039;Thrones&#039; Jon Snow Appears to Employ Neutrino Exploit Kit | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"This blog post was written by Kalpesh Mantri. You read that right. Jon Snow appears to be back from the dead. That would make &quot;Game of Thrones&quot; fans\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-10T23:04:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-06T08:59:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/kkm_b2_whois_jonSnow.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"672\" \/>\n\t<meta property=\"og:image:height\" content=\"660\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"&#8216;Thrones&#8217; Jon Snow Appears to Employ Neutrino Exploit Kit\",\"datePublished\":\"2016-06-10T23:04:28+00:00\",\"dateModified\":\"2025-06-06T08:59:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/\"},\"wordCount\":493,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/kkm_b2_whois_jonSnow.jpg\",\"keywords\":[\"computer security\",\"cybercrime\",\"cybersecurity\",\"endpoint protection\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/\",\"name\":\"'Thrones' Jon Snow Appears to Employ Neutrino Exploit Kit | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/kkm_b2_whois_jonSnow.jpg\",\"datePublished\":\"2016-06-10T23:04:28+00:00\",\"dateModified\":\"2025-06-06T08:59:56+00:00\",\"description\":\"This blog post was written by Kalpesh Mantri. You read that right. Jon Snow appears to be back from the dead. That would make \\\"Game of Thrones\\\" fans\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/kkm_b2_whois_jonSnow.jpg\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/kkm_b2_whois_jonSnow.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"&#8216;Thrones&#8217; Jon Snow Appears to Employ Neutrino Exploit Kit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"'Thrones' Jon Snow Appears to Employ Neutrino Exploit Kit | McAfee Blog","description":"This blog post was written by Kalpesh Mantri. You read that right. Jon Snow appears to be back from the dead. That would make \"Game of Thrones\" fans","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"'Thrones' Jon Snow Appears to Employ Neutrino Exploit Kit | McAfee Blog","og_description":"This blog post was written by Kalpesh Mantri. You read that right. Jon Snow appears to be back from the dead. That would make \"Game of Thrones\" fans","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-06-10T23:04:28+00:00","article_modified_time":"2025-06-06T08:59:56+00:00","og_image":[{"width":672,"height":660,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/kkm_b2_whois_jonSnow.jpg","type":"image\/jpeg"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"&#8216;Thrones&#8217; Jon Snow Appears to Employ Neutrino Exploit Kit","datePublished":"2016-06-10T23:04:28+00:00","dateModified":"2025-06-06T08:59:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/"},"wordCount":493,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/kkm_b2_whois_jonSnow.jpg","keywords":["computer security","cybercrime","cybersecurity","endpoint protection","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/","name":"'Thrones' Jon Snow Appears to Employ Neutrino Exploit Kit | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/kkm_b2_whois_jonSnow.jpg","datePublished":"2016-06-10T23:04:28+00:00","dateModified":"2025-06-06T08:59:56+00:00","description":"This blog post was written by Kalpesh Mantri. You read that right. Jon Snow appears to be back from the dead. That would make \"Game of Thrones\" fans","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/kkm_b2_whois_jonSnow.jpg","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/kkm_b2_whois_jonSnow.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/thrones-jon-snow-appears-to-employ-neutrino-exploit-kit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"&#8216;Thrones&#8217; Jon Snow Appears to Employ Neutrino Exploit Kit"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/50416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=50416"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/50416\/revisions"}],"predecessor-version":[{"id":215187,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/50416\/revisions\/215187"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=50416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=50416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=50416"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=50416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}