![]() In May 2018 the vulnerability was added into the RIG exploit kit, after the PoC code became publicly available. This ‘double play’ vulnerability may affect the latest versions of Internet Explorer and applications that are with IE kernel.įor now most of the victims are located in Asia. When you do something that you know you should do, you know it’s the right thing, but you really don’t want toyou just bite the bullet and do it. The later phase of this attack leverages a public UAC bypass technique and uses file steganography and memory reflection loading to avoid traffic monitoring and achieve loading with no files. That was about the upsides and downsides of killing off a species of mosquito. ![]() The APT group was delivering an Office document with a malicious web page embedded, once the user opens the document, the exploit code and malicious payloads are downloaded and executed from a remote server. Hackers can use the ‘double play’ flaw to implant a backdoor Trojan and take full control over the vulnerable machine. The experts have been observing an APT group targeting a limited number of users exploiting the zero-day flaw. The company uncovered a zero-day vulnerability in IE, dubbed ‘double play’, that was triggered by weaponized MS Office documents. Vulnerability exploitation was detected by Qihoo 360.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |