tags:ITWinternet_explorer original link: Resurrecting Internet Explorer: Threat Actors Using Zero-Day Tricks In Internet Shortcut File To Lure Victims newsletter link: exploits.club Weekly Newsletter 29
Exploits Club Summary:
Check Point Research was busy this week. In addition to the V8 bytecode tooling, they also released a post on a trick threat actors have been employing against windows users. This attack leverages theÂ
.url
 extension on a fake PDF file, which is opened by the decommissioned browser Internet Explorer. Sooo they just pop an 0-day in the inherently less secure browser? Nope, not even that complex - instead, they force the download of aÂ.hta
 file on the victim, resulting in code exec on the victimâs machine.