Header image

Attackers Leverage Internet Explorer Zero-Day Flaw

Recently patched vulnerability may have been used in the wild for over a year.

Threat actors are luring Windows 10 and 11 users to enable remote code execution via an Internet Explorer zero-day vulnerability.

According to research from Check Point, this vulnerability has been used in the wild for over one year, potentially impacting millions of users. Known as CVE-2024-38112, a patch was issued by Microsoft yesterday.

The researchers said attackers are using special Windows Internet Shortcut files which, when clicked, would call the retired Internet Explorer (IE) to visit the attacker-controlled URL.

“So, by default, users should not open websites with IE unless the user specifically asks to do so and with the user’s full knowledge,” researchers said.

Malicious .url samples the researcher discovered could be dated back as early as January 2023, suggesting that threat actors have been using the attacking techniques for quite some time.

Dan Raywood Senior Editor SC Media UK

Dan Raywood is a seasoned B2B journalist with over 20 years of experience, specializing in cybersecurity for the past 15 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes. Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Dan Raywood Senior Editor SC Media UK

Dan Raywood is a seasoned B2B journalist with over 20 years of experience, specializing in cybersecurity for the past 15 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes. Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Upcoming Events

08
Aug
Webinar

How to Automate the Lifecycle of Joiners, Movers, and Leavers With No-Code Solutions

Streamlining the lifecycle of joiners, movers, and leavers using no-code automation

The process of onboarding new employees and quickly removing departing staff profiles can be both time-consuming and labour-intensive.
In this live webinar, we will look at how to streamline these processes to save time and resources, and providing a smooth experience for both admins and employees.

Key takeaways:
  • Understanding the importance of securing the joiners, movers and leavers process
  • Exploring successful attacks that occurred due to errors in managing these transitions
  • Discover which advanced controls can be utilized
image image image