Site icon WinCert

Microsoft Office and Internet Explorer form Zero Day attack!

<p>Security researchers are warning users to be very careful with opening Microsoft Office files&period;<&sol;p>&NewLine;<p><img class&equals;"alignnone size-full wp-image-4335" src&equals;"https&colon;&sol;&sol;www&period;wincert&period;net&sol;wp-content&sol;uploads&sol;2021&sol;09&sol;hacker-6512174&lowbar;640&period;jpg" alt&equals;"" width&equals;"640" height&equals;"400" &sol;><&sol;p>&NewLine;<p>Because of an unpatched Internet Explorer bug users are vulnerable to malware attacks even if Internet Explorer is not their preferred browser&period; This means that an attacker can create an office file that&comma; when opened&comma; will automatically load and install malware from the page accessed in Internet Explorer&period; Some protection is available if the <em>Protected View<&sol;em> mode in IE is on&comma; but it won&&num;8217&semi;t help in every case&period;<&sol;p>&NewLine;<p>What is even more concerning is the fact that this is a Zero Day attack meaning that attackers are already exploiting this vulnerability even before Microsoft has issued a patch&period;<&sol;p>&NewLine;<p>Researchers from cybersecurity service Expmon said they have successfully tested an attack on Windows 10 machines that were running Office 2019 and Office 365&period; They also said that the nature of this exploit confirms it will always work&period;<&sol;p>&NewLine;<p>Until Microsoft releases the patch for this exploit and to mitigate the issue&comma; Microsoft suggests disabling the ActiveX feature in Internet Explorer&period;<&sol;p>&NewLine;

Exit mobile version