June 28, 2016 By Douglas Bonderud 2 min read

Until recently, the Nuclear exploit kit (EK) was among the most prolific malware delivery systems worldwide. But according to Softpedia, April 30 marked the end of Nuclear exploit activity.

So what happened to the kit and its creators? Why did it stop working? And perhaps most importantly: What’s the fallout from Nuclear EK going dark?

Credit Where Credit Is Due

Just before the exploit kit went quiet, security software firm Check Point published a two-part analysis of the program detailing both its technical and financial operations. For example, the report noted that unlike most other EKs, would-be cybercriminals who purchase a Nuclear account didn’t get a username and password on the main exploit server. Instead, login details to the control panel are housed on a single, dedicated server.

A few weeks after the report was published, Nuclear activity fell off significantly. According to SC Magazine, the security company argued that its report prompted the sudden disappearance. Check Point’s data suggested that the kit’s creators were possibly of Russian origin and making around $100,000 per month — they may have simply decided the heightened scrutiny wasn’t worth it and retired with their cash.

They could have also chosen to shutter the doors and try something else; malware-makers typically prefer to innovate rather than stagnate. Whatever the reason, however, it seems Nuclear is nonexistent. So what’s next?

Mobile Moves for More Than Nuclear EK

It’s worth noting that around the same time Nuclear EK powered down, Angler also vanished; now the Neutrino EK, Magnitude, RIG and Sundown own the top four spots in the EK activity arena. But a shift in pecking order is only the beginning. Just like ransomware infections have evolved to include worm-like capabilities and cybercriminals are leveraging old attack vectors like macro malware, the exploit market is undergoing significant change.

Consider the rise of the Godless malware, which Trend Micro analyst Veo Zhang called “reminiscent of an exploit kit in that it uses an open-source rooting framework called android-rooting-tools.” Leveraging CVE-2015-3636 and CVE-2014-3153, Godless can infect almost 90 percent of all Android devices, making it the first of its kind — but certainly not the last.

This is Nuclear’s fallout: the development of new kits that use new distribution methods and attack new devices. While it’s always a net positive to know more about malware and shut down kit-makers, there’s a bit of Newton here. For every security action, there’s a cybercriminal reaction — but unlike classical physics, the results aren’t always easy to predict.

Final thoughts? Nuclear’s gone and Angler went with it. The EK landscape is changing, and while forcing one group of attackers into early retirement is never a bad thing, there’s always another upstart waiting in the wings.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today