The creators of these kits openly boast how well their code evades anti-virus scanners, and advertise exploits of both long-patched and unpatched vulnerabilities in browsers, particularly Microsoft’s Internet Explorer.
One group, for instance, was the first to exploit the late-2005 WMF (Windows Metafile) bug, while the WebAttacker makers jumped on the VML (Vector Markup Language) vulnerability last month.
Nuclear Grabber, on the other hand, is often paired with WebAttacker — the latter is used to install a rootkit of browser helper object on a vulnerable PC — and then sends any information typed into a Web form to not only the real (and legitimate) destination, but also to the criminal.
There’s even a kit for phishing thugs, dubbed “Rock Phish Kit,” that targets cyber-crooks who don’t know how to craft a fake Web site. The kit, which Websense first spotted in November 2005, only offered 2 or three bogus branded sites when it started to sell, but now packages as many as 15 or 20, all of which can be hosted on a single server. The result of kit selling has been to boost the volume of malicious sites and the speed with which unpatched, or “zero-day” vulnerabilities, are put to work by a large number of cyber-criminals, said Hubbard.
http://www.darkreading.com/document.asp?doc_id=105163&WT.svl=cmpnews1_1