Feeds

Neosploit hack-by-numbers kit euthanized

Victim of its own success

High performance access to file storage

The distributors of Neosploit, one of the most noxious infection kits available on the internet, are retiring the product, citing support costs that didn't justify the expense.

Like MPack, Icepack and others, Neosploit was the hacking equivalent of a paint-by-numbers kit. Miscreants who didn't have the time or skills to fashion their own exploits could buy the kit and amass a sizable botnet in no time. The package was highly scalable, received regular improvements and even came with an online user forum where customers could seek help when they got stuck.

Not anymore.

According to this post from researchers at RSA FraudAction Research Labs, Neosploit is being put out to pasture. RSA cited a notice from the distributors that read:

Unfortunately, supporting our product is no longer possible. We apologize for any inconvenience, but business is business since the amount of time spent on this project does not justify itself.

We tried hard to satisfy our clients' needs during the last few months, but the support had to end at some point. We were 1.5 years with you and hope that this was a good time for your business.

Lest anyone start popping champagne corks or sing "Ding Dong the Witch is Dead," this isn't necessarily good news. For one thing, Neosploit faced stiff competition from the proliferation of competing kits, many of which sold for a fraction of the price, according to Thomas Holt, a professor of criminal justice at the University of North Carolina at Charlotte who researches the malware black market.

What's more, the RSA researchers note that Neosploit may be a victim of its own success.

"It is likely that Neosploit was finding it difficult to sustain its new customer acquisition rate, and that its existing customers were not generating enough revenue to sustain the prior rate of development," they wrote. "These problems appear to have been too much of a burden, and we now believe that the Neosploit development team has been forced to abandon its product."

Anytime there's bang-up business there are sure to be repeats and knockoffs. So brace yourself: This isn't likely to be the last we've heard from these guys. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.