RIG Exploit Kit
RIG is spread via suspicious advertisements that have been inserted into legitimate websites. The VIP version of the exploit kit, RIG-v, appeared in 2016 and uses new URL patterns.Related Threats
Exploit Kits
Campaigns
- Operation Pitty Tiger^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/campaigns-details.operation-pitty-tiger.html
- Operation FormBook^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/campaigns-details.operation-formbook.html
- Operation Afraidgate^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/campaigns-details.operation-afraidgate.html
- Operation DragonFly^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/campaigns-details.operation-dragonfly.html
- Operation Deep Panda^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/campaigns-details.operation-deep-panda.html
- Operation ProMediads^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/campaigns-details.operation-promediads.html
Ransomware
- CryptFIle2 - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.cryptfile2-ransomware.html
- ASN1 - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.asn1-ransomware.html
- Nemty - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.nemty-ransomware.html
- Sage - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.sage-ransomware.html
- CryptoShield - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.cryptoshield-ransomware.html
- CrypMIC - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.crypmic-ransomware.html
- Mobef - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.mobef-ransomware.html
- Dxh26wam - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.dxh26wam-ransomware.html
- Paradise - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.paradise-ransomware.html
- GandCrab - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.gandcrab-ransomware.html
- CryptoMix Revenge - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.cryptomix-revenge-ransomware.html
- BartCrypt - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.bartcrypt-ransomware.html
- Spora - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.spora-ransomware.html
- Erebus - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.erebus-ransomware.html
- Mole - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.mole-ransomware.html
- Cry - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.cry-ransomware.html
- FessLeak - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.fessleak-ransomware.html
- Matrix - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.matrix-ransomware.html
- Sodinokibi - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.sodinokibi-ransomware.html
- Cerber - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.cerber-ransomware.html
- Philadelphia - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.philadelphia-ransomware.html
- Locky - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.locky-ransomware.html
- CryptoWall - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.cryptowall-ransomware.html
- Alma Locker - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.alma-locker-ransomware.html
- Fake Globe - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.fake-globe-ransomware.html
- Princess Locker - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.princess-locker-ransomware.html
- BandarChor - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.bandarchor-ransomware.html
- YafunnLocker - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.yafunnlocker-ransomware.html
- ERIS - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.eris-ransomware.html
- Goopic - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.goopic-ransomware.html
- Radamant - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.radamant-ransomware.html
- CryptoMix - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.cryptomix-ransomware.html
- AnteFrigus - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.antefrigus-ransomware.html
- GetCrypt - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.getcrypt-ransomware.html
- Buran - Ransomware^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/ransomware-details.buran-ransomware.html
Vulnerabilities
- CVE-2016-4117^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2016-4117.html
- CVE-2016-0034^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2016-0034.html
- CVE-2016-3298^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2016-3298.html
- CVE-2018-4878^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2018-4878.html
- CVE-2013-3896 ^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2013-3896.html
- CVE-2015-0311^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2015-0311.html
- CVE-2012-0507^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2012-0507.html
- CVE-2015-7645^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2015-7645.html
- CVE-2015-5119 ^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2015-5119.html
- CVE-2013-0074 ^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2013-0074.html
- CVE-2014-0322^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2014-0322.html
- CVE-2016-7200^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2016-7200.html
- CVE-2012-1723^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2012-1723.html
- CVE-2015-8651 ^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2015-8651.html
- CVE-2015-0359 ^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2015-0359.html
- CVE-2013-2423^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2013-2423.html
- CVE-2013-2465^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2013-2465.html
- CVE-2016-7201^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2016-7201.html
- CVE-2015-3090 ^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2015-3090.html
- CVE-2018-8174^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2018-8174.html
- CVE-2015-3113 ^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2015-3113.html
- CVE-2013-2551^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2013-2551.html
- CVE-2013-1493^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2013-1493.html
- CVE-2015-2419 ^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2015-2419.html
- CVE-2014-0497^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2014-0497.html
- CVE-2016-1019^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2016-1019.html
- CVE-2013-0322^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2013-0322.html
- CVE-2014-0569^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2014-0569.html
- CVE-2014-6332^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2014-6332.html
- CVE-2013-0634^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2013-0634.html
- CVE-2013-7331^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2013-7331.html
- CVE-2015-5122 ^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2015-5122.html
- CVE-2014-0515^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2014-0515.html
- CVE-2016-0189^/content/enterprise/en-us/threat-center/threat-landscape-dashboard/vulnerabilities-details.cve-2016-0189.html