Tuesday, February 11, 2025
HomeComputer SecurityAPT Cyber Attack Using Unpatched Internet Explorer Zero-Day to Hack Windows Computers

APT Cyber Attack Using Unpatched Internet Explorer Zero-Day to Hack Windows Computers

Published on

SIEM as a Service

Follow Us on Google News

Cyber Criminals behind the APT attack using an Internet Explorer Zero-Day vulnerability to compromise the windows based computers.

An APT hacking group using MS Office document attack using the browser 0day vulnerability exploit this vulnerability on victims PC.

Cyber Criminals using variously advanced techniques to compromise the victims and execute the backdoor into their network and zero-day vulnerabilities are big fish for Malicious hackers to perform sophisticated cyber attacks in wide.

Already Security researchers from Security Qihoo 360 Core revealed that they uncovered an IE 0day vulnerability has been embedded in malicious MS Office document, targeting limited users by a known APT actor.

Internet Explorer Zero-Day “double kill” Exploit 

An office document abused by cyber criminals and distributed this Zero-day vulnerability called “double kill”  to exploit latest versions of Internet Explorer and applications that use the IE kernel.

A Malicious office document distributed via spam email and other online media to reach the victims and tricked them to open the document leads to eventually infect the targetted computer.

Eventually, attacker implanted in the backdoor Trojan or even full control of the computer after the successful execution of windows based computers.

Mainly hackers using malicious embedded web page implement this APT attack to delivering an Office document and once the victims open the document, exploit code and malicious payload are loaded through the remote server.

According to weibo Report, The late exploit phase of the attack uses public UAC bypass techniques and uses file steganography and memory reflection loading to avoid traffic monitoring and fileless downloads.

If You can understand this Image language then you can help us to translate for other readers

Cybercriminals silently executing this Internet Explorer Zero-Day “double kill” vulnerability and run the malicious web page and background and execute an attack program.

Qihoo 360 Core already warned that users to not open office documents from unknown sources and they reported to Microsoft the details of the browser’s 0day vulnerability

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

SolarWinds Improves Web Help Desk in Latest 12.8.5 Update

SolarWinds announced the release of Web Help Desk (WHD) version 12.8.5, unveiling a host...

FinStealer Malware Targets Leading Indian Bank’s Mobile Users, Stealing Login Credentials

A new cybersecurity threat has emerged, targeting customers of a prominent Indian bank through...

Evil Crow RF Tool Transforms Smartphones into Powerful RF Hacking Devices

Innovative tools are continually appearing to enhance the capabilities of professionals and enthusiasts alike.One...

Massive Facebook Phishing Attack Targets Hundreds of Companies for Credential Theft

A newly discovered phishing campaign targeting Facebook users has been identified by researchers at...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

FinStealer Malware Targets Leading Indian Bank’s Mobile Users, Stealing Login Credentials

A new cybersecurity threat has emerged, targeting customers of a prominent Indian bank through...

Researchers Found North Korean Hackers Advanced Tactics, techniques, and procedures

Recent research has highlighted the increasingly sophisticated tactics, techniques, and procedures (TTPs) employed by...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...