Share this article
Latest news
With KB5043178 to Release Preview Channel, Microsoft advises Windows 11 users to plug in when the battery is low
Copilot in Outlook will generate personalized themes for you to customize the app
Microsoft will raise the price of its 365 Suite to include AI capabilities
Death Stranding Director’s Cut is now Xbox X|S at a huge discount
Outlook will let users create custom account icons so they can tell their accounts apart easier
New Internet Explorer zero-day exploit sneaks malware into PCs
4 min. read
Updated onJuly 31, 2021
updated onJuly 31, 2021
Share this article
Read our disclosure page to find out how can you help Windows Report sustain the editorial teamRead more
A Chinesecybersecurityfirm has discovered azero-dayvulnerability in Microsoft’sInternet Explorer, which they say is already being used by cyber criminals to infect machines. Qihoo 360, the company that released the shocking discovery, revealed in its report that the bug, dubbed ‘double kill’ due to the fact that it targets both Internet Explorer and any apps using theIEkernel, is currently in use by an advanced persistent threat often known to be sponsored by a government.
Internet Explorercomes pre-installed on each Windows computer, despite it being overtaken by the new Microsoft Edge browser, but because many organizations still use Internet Explorer, Microsoft decided to let it stay though the firm doesn’t give it as much focus in terms of improving thebrowseras it does with Edge.
There is a new, serious flaw now leaves IE open to malware attacks, as the bug uses a Microsoft Office document with a pre-installed vulnerability, which opens a web page that then downloads a piece ofmalware. Researchers say the malware takes advantage of aUAC(User Account Control) bypass while using embedding technology, such that a message, image or file can be embedded within another message, image or file.
Although the news about the bug has spread widely, Microsoft is yet to issue a response with regards to the vulnerability, and so far, a patch is not yet available for it. However, users ofInternet Explorerare cautioned against opening any Office attachments from sources unknown to them, because the bug requires that the ‘victim’ opens a malicious Microsoft Office document that has a link to a website which delivers the malware payload.
According to Qihoo 360, once infected, attackers can install backdoor Trojans or gain total control over the machine. Qihoo 360’s report doesn’t mention what the actual zero-day vulnerability is, and how the software isdelivered, neither does it reveal the APT actor or government sponsors that may be behind the attack. What the report does mention, however, is the sequence with which the attack functions, and the firm has requested for an urgent release of a patch, though this is left at Microsoft’s discretion for now.
To stay protectedfrom the zero-day exploit, here are some tips to avoid infection:
You can secure 100% ofall your internet access with a good VPN. We recommendCyberGhost, trusted by 15milion users over the world for the enhanced protection of browsing experience.Download now CyberGhost (currently 77% off).
Currently, it seems all Internet Explorer versions are vulnerable to this and other attacks, regardless of the version of Windows operating system being used, which means documents opened with any version of Office will trigger the vulnerability thus an attack. This extends to Windows 10 and Office 2016 as well, which are said to be vulnerable.
Microsoft is expected to release a new batch of security updates in the first weeks of May 2018, on Patch Tuesday, but, this is dependent on how many attacks this new flaw will come with, meaning a quick fix could be released before then.
RELATED STORIES TO CHECK OUT:
More about the topics:Cybersecurity,Internet Explorer Issues,windows 10
Milan Stanojevic
Windows Toubleshooting Expert
Milan has been enthusiastic about technology ever since his childhood days, and this led him to take interest in all PC-related technologies. He’s a PC enthusiast and he spends most of his time learning about computers and technology.
Before joining WindowsReport, he worked as a front-end web developer. Now, he’s one of the Troubleshooting experts in our worldwide team, specializing in Windows errors & software issues.
User forum
0 messages
Sort by:LatestOldestMost Votes
Comment*
Name*
Email*
Commenting as.Not you?
Save information for future comments
Comment
Δ
Milan Stanojevic
Windows Toubleshooting Expert
Before joining WindowsReport, he worked as a front-end web developer. Now, he’s specialized in Windows errors & software issues.