Tech Tips Home
The Best Tech Tips And Daily Deals
Newsletter On The Internet!

Shop online 24hrs a day or call us Mon-Fri
8:30AM-4:30PM EST - 1-800-915-2088
WorldStart Tech Tip And Store Search
Email: Password: Login Remember Me
looking for freeware

Like what you see here? Subscribe to the Tech Tips newsletter!   Email: Subscribe

Attack Toolkits – How Crooks Get The Tools To Attack Your Computer

Wednesday, April 30th, 2014 by | Filed Under: Security Help

Ever wonder where cyber-criminals get the tools to go after your computer? Not every crook out there is a computer genius who can craft malware or seek out code flaws like HeartBleed.  Thieves that break into cars and houses don’t forge their own tools from molten metal. They go to the store just like you or I would for tools. Now, cyber-criminals don’t stroll on down to the hardware store – they take advantage of a massive online marketplace that sells the perfect tools for attacking your computer.

Just like you can log onto our site and order a stylus pen or flash drive, these guys can log onto black market sites and fill up their shopping cart with attack toolkits. Attack toolkits are groups of malicious code. This code allows crooks to steal the information from companies and from you and to take over your computer. They can then use your computer to attack other computers.

Most of this code is written originally to attack business or government computers originally. Big time criminals probably won’t take the time to go after individual home users. But then these guys sell this code to smaller players who have plenty of time to go after the individual.

According to security experts Symantec, “Attack kits are significantly advancing the evolution of cybercrime into a self-sustaining, profitable, and increasingly organized economic model worth millions of dollars.”

More than 60% of web-threats can be traced back to these attack toolkits. And since you don’t really need many computer skills to launch them, it enables more and more criminals to get into the cyber-crime business.

Favorite targets for these toolkits were Microsoft’s Active Template Library Header vulnerability, Adobe Flash Player’s Remote Bugger Overflow and various Apple and Microsoft issues.  Tablets and phones are also a new favorite target. The Dendroid kit, clearly advertises what it can get from your phone in the image below.

There’s even a specific search engine just for searching the black market for things like malicious software toolkits as well as drugs and other contraband. Running a search for toolkits, I was able to find offers for a hacking kit and for kit that promises to allow you to set up a fake PayPal account where you can transfer your ill-gotten gains.

Why don’t authorities bust these people? They try, but they have to find them first and many of them are based on servers located in countries that don’t active seek out or prosecute cyber-criminals.

That’s why it’s very important to make sure you run all security updates available for Windows, Flash, Java and other programs and make sure to keep your security and malware software completely up-to-date. There are an ever-growing number of folks who are dedicating their time to finding a way into your computer.

 ~ Cynthia

Tags: ,

3 Responses to “Attack Toolkits – How Crooks Get The Tools To Attack Your Computer”

  1. Patty says:

    Great tip. Thank you for the information.

  2. Joyce kelley says:

    How kind of you to give the EXACT names of pgms needed so hackers (who didn’t know about these sites nor thought of how easy this is before) can now train themselves to attack more computers!&^%$#@
    Did not it occur to you to warn us honest users without the instructions as to HOW TO DO IT? (THUMBS DOWN)

    • cynthia says:


      These sites and marketplaces are by no means any kind of secret. I did not give the exact name of the sites or marketplaces where you can search for them, but anyone who is interested can find them quickly with any an Internet search of almost any engine. Hackers already know where these things are. The names of these malicious toolkits have been publicized in security alerts from security companies warning of their effects. The purpose of pointing out the existence of the marketplace for home users is to make people understand just how easy it is for those with bad intent to attack your computer.

Leave a Reply

Like these tips? Get them for FREE in your email!

WorldStart's Tech Tips Newsletter

  • Tech Tips Daily - Become a tech pro! Get the very best tech and computer help sent directly to your email every weekday!

  • Tech Tips Weekly - If you don't want our Tech Tips newsletter every day, then sign up for this weekly newsletter to get the best information of the week. Sent on Fridays.

Other Newsletters

  • WorldStart's Daily Deals - Every week, we send out great deals in our Daily Deals newsletter. Many of these deals are exclusively for our Daily Deals newsletter subscribers and can't be found with our regular specials.

  • Just For Grins - Each issue includes a couple clean jokes, some funny quotes, and a hilarious reader's story. Newsletter is sent five days a week.

Enter Email Address:


Your e-mail address is safe with us!
We only use it to send you the newsletters you request. It is NEVER disclosed to a third party for any reason, ever! Plus, if you decided you don't like our newsletters (don't worry, you'll love them), unsubscribing is fast and easy.

Free Newsletter Signup

Tech Tips Daily

Become a tech pro! Get the very best tech and computer help sent directly to your email every weekday!

Tech Tips Weekly

The week's best in tech and computer help. Get your issue sent to your email every Friday!

WorldStart's Daily Deals

The very best deals on the Internet! Get a new set of incredible sales every day of the week!

Just For Grins

Clean jokes, funny quotes, and hilarious comics. Sent 5 times a week straight to your email.


Love Worldstart? Refer A Friend!

looking for freeware
WorldStart's Premium Membership

Tip Archive