<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>Nao_sec provides cyber security research dedicated to&nbsp;<a href="https://en.wikipedia.org/wiki/Exploit_kit">Exploit Kits</a>. In campaigns that include Exploit Kits, landing pages with malicious code are used in an attempt to exploit a specific vulnerability on the victim's device.</p> <!--more--> <p><img src="https://info.threatstop.com/hubfs/0000_Sec_Logo_with_tm.png" alt="0000_Sec_Logo_with_tm" width="526" height="638" style="width: 526px; display: block; margin: 0px auto;"></p> <p>Nao_sec's research includes information on recent and active Exploit Kits, including the GrandSoft Exploit Kit, reported January 2018 and distributing GandCrab ransomware by <a href="https://blog.malwarebytes.com/threat-analysis/2018/01/gandcrab-ransomware-distributed-by-rig-and-grandsoft-exploit-kits/">Malwarebytes</a>.</p> <p>To enable Nao_sec's data on your firewall, turn on the <strong>Nao Sec – IPs</strong> and <strong>Nao Sec - Domains</strong> in the ThreatSTOP portal. If <strong>TS Curated - Drive-by Attacks</strong> is not already in your policy, we highly advise adding it to protect yourself from these kind of attacks.</p> <p>If you don’t have a ThreatSTOP account are interested in what we do, check out a quick demo here.</p> <p>If you do have a ThreatSTOP account, instructions to add targets to DNS or IP Defense policies are available on the ThreatSTOP Documentation Hub. Or, contact our .</p></span>