Trend Micro Chief Technology Officer Raimund Genes alerts of an emerging exploit kit dubbed Whitehole Exploit Kit. The malware uses similar code as Blackhole Exploit kit but unlike the last one uses JavaScript to hide its usage of plugindetect.js, while Whitehole does not. It directly uses it without obfuscating this.
Whitehole Exploit Kit exploits such vulnerabilities to download malicious files onto the computers of its victims: CVE-2012-5076, CVE-2011-3544, CVE-2012-4681, CVE-2012-1723, CVE-2013-0422.
Malware, which Whitehole Exploit Kit includes, connects to certain websites in order to send and receive data as well as terminate some processes. Besides it downloads other malicious files onto already infected systems.
Researchers say that Whitehole Exploit Kit is available in “test-release” mode. The developers of the malware sell it for a certain fee ranging from USD 200 to USD 1800. New toolkit is notable for an ability to hide itself from antimalware detections, to prevent Google Safe Browsing from blocking it, and to load a maximum of 20 files at once.