<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><h2>ThreatSTOP and DNS Firewall Blocking Two New Malware Types</h2> <p><a title="ThreatSTOP" href="http://threatstop.com" target="_blank">ThreatSTOP</a> has started blocking two new varieties of malware for our subscribers and those of our OEM partner<a title="Infoblox DNS Firewall" href="http://www.infoblox.com/products/dns-dhcp-services/dns-firewall" target="_blank"> Infoblox</a>.</p> <!--more--><p>The first malware type is the <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/a-new-exploit-kit-in-neutrino/">Neutrino Exploit Kit</a>, for which we are blocking the servers that drop the kit onto vulnerable computers. The Kit is sold on underground forums to criminals who use it to gain access to a computer and then download other malware onto it. This is an extremely dangerous malware kit and it is updated regularly to contain the latest exploits, primarily in Java.</p> <p>The second is the <a href="http://c-apt-ure.blogspot.com/2013/05/ponmocup-hunter-sans-dfir-summit-2013.html">Ponmocup</a> Adware Botnet also known as <a href="http://www.symantec.com/security_response/writeup.jsp?docid=2010-071503-4247-99&amp;tabid=2">Trojan.Milicenso</a>. Ponmocup is currently considered less harmful as it seems to be used mainly for adware and clickfraud but there is no reason to assume that this will remain the case.</p> <p>To learn more read this <a href="http://www.threatstop.com/neutrino-ponmocup">article</a></p> <p><strong>About ThreatSTOP &nbsp;</strong></p> <p>ThreatSTOP is a real-time IP and Domain Reputation Service that automatically delivers a block list against criminal malware (botnets, Trojans, worms etc.) directly to a user’s firewalls and nameservers, so they can enforce it. It is a cloud-based service that protects the user’s network against the most serious information security problem today—malware designed to steal valuable data perpetrated by organized criminals. ThreatSTOP enables existing hardware and network infrastructure to enforce user defined malware blocking policy without requiring the expense, complexity and time of a forklift upgrade of new equipment. It can be deployed within the hour with simple rule-settings or a script on the user’s firewall, or by enabling DNS Firewall (RPZ) on their Infoblox Grid. Founded in 2009, ThreatSTOP is headquartered in San Diego, CA. For more information, visit <a href="http://www.threatstop.com">http://www.threatstop.com</a>.</p></span>