Another wave of attacks target Internet Explorer
Other versions of Internet Explorer are now vulnerable to exploitation, including the new beta of the latest update.
The Internet Explorer vulnerability currently investigated by Microsoft has spread to other versions of the browser, including the newest Internet Explorer (IE) 8 Beta 2.
A new advisory has warned that as well as Internet Explorer 7, other versions potentially vulnerable to attacks are IE 5.01 Service Pack 4, IE 6 Service Pack 1, IE 6 and IE 8 Beta 2.
The vulnerability looks like it is getting very serious, with Ivan Macalintal, advanced threats researcher for Trend Micro, reporting that the number of infected sites had risen to 6,000 and was quickly increasing in number.
Microsoft researchers Ziv Mador and Tareq Saade also said that attacks had risen significantly over the weekend, with an increase of over 50 per cent in the number of reports.
There are more technical details of the vulnerability as well as some workaround options to make Internet Explorer safe from danger here.
However, some experts have advised users to use an alternative browser until Microsoft issues a patch for the problem.
The website Shadowserver has listed a number of domains known to be exploiting the vulnerability. According to Microsoft, the current trend for attack uses SQL injection attacks against websites, and proceeds to load attack code.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
In the new advisory, Microsoft repeated its previous statement that it would take the appropriate action once it had completed the investigation.
-
Hounslow Council partners with Amazon Web Services (AWS) to build resilience and transition away from legacy techSpomsored One of the most diverse and fastest-growing boroughs in London has completed a massive cloud migration project. Supported by AWS, it was able to work through any challenges
-
Salesforce targets better data, simpler licensing to spur Agentforce adoptionNews The combination of Agentforce 360, Data 360, and Informatica is more context for enterprise AI than ever before
-
Exploitation of Docker remote API servers has reached a “critical level”News Hackers are targeting Docker’s remote access API as it allows them to pivot from a single container to the host and deploy malware with ease
-
Cyber criminal underground “thriving” as weekly attacks surge by 75% in Q3 2024Cyber attacks reached another all-time high this quarter as digital crime continues to be a highly profitable industry for threat actors
-
Alarm raised over patched Phemedrone Stealer malware that's being used to target Windows PCs - here's what you need to knowNews Phemedrone Stealer is being used to exploit a vulnerability in Windows Defender SmartScreen despite the issue being patched in November 2023
-
SOC modernization and the role of XDRWhitepaper Automate security processes to deliver efficiencies across IT
-
Uncovering the ransomware threat from global supply chainsWhitepaper Effectively mitigate ransomware risk
-
The near and far future of ransomware business modelsWhitepaper Discover how criminals use ransomware as a cyberweapon
-
Trend Micro security predictions for 2023Whitepaper Prioritise cyber security strategies on capabilities rather than costs
-
'Potentially unsecured' SMBs are propping up an IT supply chain riddled with ransomwareNews More than half of IT supply chains have been impacted by ransomware attacks in recent years and organisations are failing to implement the necessary steps to prevent future damage