Internet Explorer Zero-Day Exploited in the Wild by APT Group

Discussion in 'malware problems & news' started by guest, Apr 20, 2018.

  1. guest

    guest Guest

    Internet Explorer Zero-Day Exploited in the Wild by APT Group
    April 20, 2018
    https://www.bleepingcomputer.com/ne...-zero-day-exploited-in-the-wild-by-apt-group/
     
  2. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    If one by now has not disabled all active content capability in Office apps, they deserve to get nailed by this. Ditto for like capable apps such as PDF readers and client e-mail apps. If you're using web based e-mail and reading your e-mail using IE, find a different browser to do so.

    Appears this exploit doesn't apply to Edge? Makes me believe if enhanced PM options are enabled in IE; your using Win 10; and running in Private mode which runs IE under svchost.exe - runtimebroker.exe, you also might not be vulnerable.
     
  3. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    I agree for frequent users of this forum. Average users OTOH would not change default settings, so we can blame developer (and attackers of course).
     
  4. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    You deserve to get hit with this if you're still using IE. :D
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.