tags:ITWinternet_explorer original link: Resurrecting Internet Explorer: Threat Actors Using Zero-Day Tricks In Internet Shortcut File To Lure Victims newsletter link: exploits.club Weekly Newsletter 29


Exploits Club Summary:

Check Point Research was busy this week. In addition to the V8 bytecode tooling, they also released a post on a trick threat actors have been employing against windows users. This attack leverages the .url extension on a fake PDF file, which is opened by the decommissioned browser Internet Explorer. Sooo they just pop an 0-day in the inherently less secure browser? Nope, not even that complex - instead, they force the download of a .hta file on the victim, resulting in code exec on the victim’s machine.