Fallout Exploit Kit
First observed in 2018, Fallout is a new exploit kit that is based on the older Nuclear Pack exploit kit.
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
First observed in 2018, Fallout is a new exploit kit that is based on the older Nuclear Pack exploit kit.
Affected platforms
The following platforms are known to be affected:
Threat details
At the time of publication, Fallout's distribution method is unknown, however it is probable that it is spread via phishing campaigns.
Fallout exploits two vulnerabilities. The first being a use-after-free vulnerability in Adobe Flash Player (CVE-2018-4878). The second is a vulnerability in the way that Visual Basic Script engines handle objects in system memory (CVE-2018-8174).
Threat updates
| Date | Update |
|---|---|
| 10 Sep 2018 |
Update
Further details have emerged regarding Fallout's infection vector and payloads. The exploit kit is delivered by drive-by-download or malvertising attacks from previously compromised websites. It will fingerprint the user's browser profile in an attempt to match to a target of interest. If successful, the user is redirected to a landing page for the kit. Once on a device, Fallout will install different malware depending on the user profile collected earlier. Observed payloads include Smoke Loader and GandCrab. |
Remediation advice
To prevent and detect an infection, ensure that:
Remediation steps
| Type | Step |
|---|---|
|
CVE Vulnerabilities
Last edited: 11 January 2022 3:44 pm