They were sold on black markets, enabling attackers to use exploits without advanced knowledge of computer security.
[9] Following a joint-operation between Cisco Talos and GoDaddy to disrupt a Neutrino malvertising campaign,[10] the authors stopped selling the kit, deciding to only provide support and updates to previous clients.
There are also ways for subscribers to receive these prevention systems on a continuous basis, which helps them to better defend themselves against attacks.
Some of these techniques include obfuscating the code,[17] and using fingerprinting to ensure malicious content is only delivered to likely targets.
[18][1] Modern exploit kits include features such as web interfaces and statistics, tracking the number of visitors and victims.