Zero-day Leaked in Internet Explorer User Against Security Researchers

The recently revealed attacks against security researchers also used a zero-day vulnerability in Internet Explorer. A security update from Microsoft is not yet available. At the end of January, Google and Microsoft released information about a group of attackers who had targeted security researchers. They were invited by the attackers to participate in security research.

The "research" the researchers received was actually malware. In addition, the attackers probably used a zero-day vulnerability in Google Chrome. Several researchers who visited a blog of the attackers with fully patched versions of Windows 10 and Chrome became infected with malware. Now security company ENKI reports that the attackers also used a zero-day vulnerability in Internet Explorer.

Several ENKI researchers received an MHTML file named "Chrome_85_RCE_Full_Exploit_Code". This file asks for permission to run JavaScript, in order to display all content. When allowed, the script downloads a zero-day exploit for Internet Explorer. The vulnerability could allow an attacker to run arbitrary code on the system. Since the vulnerability has not yet been resolved, ENKI does not provide further details. Mitja Kolsek , CEO of security company Acros Security, states that it is a very reliable 'zero-click' vulnerability in the browser.
Previous Post Next Post