Out of the Box Solutions Blog

Out of the Box Solutions has been serving the Michigan area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

There’s a New Internet Explorer Zero-Day Threat in Town

There’s a New Internet Explorer Zero-Day Threat in Town

Have you ever heard the phrase zero-day threat? Basically, they are the scariest threats out there, because they are unaddressed and unresolved by the software developer, all while being actively exploited in the wild. This effectively gives the developer zero days to address the issue before it becomes a problem. Today, one of the most dangerous threats of the zero-day variety takes advantage of a weakness in Internet Explorer - but there is now a patch for it.

This threat is called the Double Kill Internet Explorer vulnerability, and it was found by Chinese developers from a computer security company called Qihoo 360 Core Security. Unfortunately, they have been relatively quiet about what the specifics of this double-kill IE bug really are. This makes it much more difficult to address and identify, as identifying the warning signs can become nigh-impossible. After all, if you don’t know anything about the threat, how can you protect your business from it?

This threat uses Word documents to spread, leveraging a flaw in the Windows VBScript engine. When the Word document is opened, Internet Explorer is also opened in the background, triggering a download for an executable file. This vulnerability is designed to operate in the background without notifying the user in any way. The downloaded executable file will install a Trojan horse malware on the device, allowing the hacker to infiltrate the system at a later date without the user’s knowledge.

While we know what the threat is, there is still a lot more that we don’t know about it for sure. Professionals aren’t sure if all Word documents are affected, or if the threat needs Microsoft Office specifically installed on the device in order for the vulnerability to take root. No one even knows what role Internet Explorer plays in the attack either, or if the documents that initiate the attack are identifiable.

The only way to optimize your security against zero-day threats is to ensure that you keep best practices in mind at all times.

To get started thinking about how you can protect your business from an unknown threat, be sure to consider the basics. For one, you should never download a file from an unexpected sender. You might get emails from suspicious addresses claiming to be resumes, receipts, or other documents that your business might find useful. You can never know for sure if you’re putting your business in danger by downloading these files, so it’s best to err on the side of caution and bolster your defenses with enterprise-level security solutions. It’s especially important that you do this as soon as possible, as you never know what new types of threats will be made apparent on a daily basis.

To learn more about how your organization can protect its assets and ensure security, reach out to Out of the Box Solutions at 800-750-4OBS (4627).

Are Your Printing Expenses Secretly Out of Control...
Tip of the Week: Working with Your Router for Bett...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, June 20 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Cybersecurity Business Computing Network Security Privacy Technology Hardware Ransomware Internet Android Tech Term Email Applications Data Malware Business Management Smartphones Microsoft Wi-Fi Mobile Devices Remote Computing Saving Money Computer Wireless Charging Collaboration Innovation Employer-Employee Relationship Blockchain Gmail Small Business Computers Communication Business IT Services Save Money Communications Outsourced IT Patch Management Artificial Intelligence Cost Management Social Media Productivity Managed IT services Business Intelligence Cortana VPN Passwords Data Management Windows 10 Tech Terms IT Support Cloud Wireless Backup Processors Ink Bandwidth Movies Laptop Password Excel Twitter Database Office Data loss Digital Vulnerability PowerPoint Telecommuting Government Knowledge Efficiency Office 365 Inventory Virtualization Cybercrime Content Filtering Spam Browser Spyware Sports BDR Unified Communications Server Management Telephony Data Protection Server Tactics Virus Edge HP Internet of Things Workers RAM VoIp User Tips Voice over IP Mobile Security Antivirus Connectivity Millennials Hackers Microsoft Teams IT budget Automation Holiday Operating System Lead Generation Maintenance Staff Apps Technology Tips Business Technology eCommerce Virtual Assistant Router Managed IT Services Cloud Computing Analytics Data Backup Environment Machine Learning Online Shopping Internet Explorer Tip of the week Websites Streaming Media IT Management Phishing Backup and Disaster Recovery Google e-waste Comparison WannaCry Threat User Tip Safety Downloads Big Data Data Breach Hard Drives G Suite disposal Specifications Software Settings HIPAA Printing Networking Trends Marketing SSD Sales Value Telecommute Document Management Hard Drive Paper Dongle A.I. Physical Security Network Attached Storage Managed IT Service Facebook Tablet Battery Conferencing Smartphone Paperless Office Data recovery Alert Gadgets Users Company Culture Managing Stress Bring Your Own Device Hybrid Cloud