Zscaler ThreatLabZ has been seeing a steady increase in the Nuclear Exploit Kit (EK) traffic over the past few weeks. The detection of malicious activity performed by this EK remains low, due to usage of dynamic content and heavy obfuscation. In this blog, we will walk you through a complete Nuclear EK infection cycle with a live example. We will also share details of the identified payload, which had very low Anti-Virus (AV) detection rates.
more here...........http://research.zscaler.com/2014/09/nuclear-exploit-kit-complete-infection.html
more here...........http://research.zscaler.com/2014/09/nuclear-exploit-kit-complete-infection.html