KaiXin exploit kit was first identified in August 2012 by Kahu Security
KaiXin masquerades as a statistics tracking script and uses URL encoding to trivially obfuscate the injected script.
The initial KaiXin landing page, which has no obfuscation, contains logic for handling different browsers. These landing pages are used to install malware onto a user’s device.
All Internet Web Browsers
Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.