Until recently, the Nuclear exploit kit (EK) was among the most prolific malware delivery systems worldwide. But according to Softpedia, April 30 marked the end of Nuclear exploit activity.

So what happened to the kit and its creators? Why did it stop working? And perhaps most importantly: What’s the fallout from Nuclear EK going dark?

Credit Where Credit Is Due

Just before the exploit kit went quiet, security software firm Check Point published a two-part analysis of the program detailing both its technical and financial operations. For example, the report noted that unlike most other EKs, would-be cybercriminals who purchase a Nuclear account didn’t get a username and password on the main exploit server. Instead, login details to the control panel are housed on a single, dedicated server.

A few weeks after the report was published, Nuclear activity fell off significantly. According to SC Magazine, the security company argued that its report prompted the sudden disappearance. Check Point’s data suggested that the kit’s creators were possibly of Russian origin and making around $100,000 per month — they may have simply decided the heightened scrutiny wasn’t worth it and retired with their cash.

They could have also chosen to shutter the doors and try something else; malware-makers typically prefer to innovate rather than stagnate. Whatever the reason, however, it seems Nuclear is nonexistent. So what’s next?

Mobile Moves for More Than Nuclear EK

It’s worth noting that around the same time Nuclear EK powered down, Angler also vanished; now the Neutrino EK, Magnitude, RIG and Sundown own the top four spots in the EK activity arena. But a shift in pecking order is only the beginning. Just like ransomware infections have evolved to include worm-like capabilities and cybercriminals are leveraging old attack vectors like macro malware, the exploit market is undergoing significant change.

Consider the rise of the Godless malware, which Trend Micro analyst Veo Zhang called “reminiscent of an exploit kit in that it uses an open-source rooting framework called android-rooting-tools.” Leveraging CVE-2015-3636 and CVE-2014-3153, Godless can infect almost 90 percent of all Android devices, making it the first of its kind — but certainly not the last.

This is Nuclear’s fallout: the development of new kits that use new distribution methods and attack new devices. While it’s always a net positive to know more about malware and shut down kit-makers, there’s a bit of Newton here. For every security action, there’s a cybercriminal reaction — but unlike classical physics, the results aren’t always easy to predict.

Final thoughts? Nuclear’s gone and Angler went with it. The EK landscape is changing, and while forcing one group of attackers into early retirement is never a bad thing, there’s always another upstart waiting in the wings.

more from