Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

Before we start making Internet Explorer jokes, we want to mention that there is nothing funny about online threats--particularly those that haven’t been addressed yet by the developers. This newly discovered zero-day threat is called the “Double Kill” Internet Explorer vulnerability. Unfortunately, the Chinese developers who discovered this vulnerability--a computer security company called Qihoo--have been quiet about the details regarding the double-kill IE bug. It’s also difficult to tell if your organization is under threat, as they aren’t revealing any of the warning signs of such an attack.

The only thing known for sure about this threat is that it takes root by using Word documents. It’s likely that this is done through email attachments as well, as email is a major method of transporting threats of all kinds. When the document is opened up, Internet Explorer is opened in the background via some kind of shellcode that downloads an executable file. The vulnerability does all this without showing anything of note to the user, making it a difficult threat to identify, but the effects are well-known. Apparently, the downloaded executable file installs a Trojan horse malware on the user’s device which creates a backdoor into the system.

There are a lot more unknowns than anything else with this vulnerability, though. In particular, professionals aren’t sure if all Word documents are affected by this vulnerability, or if the threat even needs Microsoft Office in order to function as intended. It’s not even known what role Internet Explorer plays in the attack, or if the documents that can trigger this attack are identifiable. All we can tell you is that you need to keep security best practices in mind to keep these kinds of zero-day threats from becoming a problem for your organization.

To start, you should never download an unexpected file from an unexpected sender. This can come in the form of a resume, receipt, or other online document. You can never know for sure what you’re actually downloading, as criminals have been able to spoof email addresses to a dangerous degree in recent years. Just be cautious about everything you can, and augment caution with powerful security tools that can identify potential risks before they become major problems.

To get started with network security, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 22 January 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Hardware Internet User Tips IT Support Efficiency Malware Privacy Email Phishing Google Workplace Tips Computer IT Services Users Collaboration Mobile Device Hosted Solutions Ransomware Quick Tips Cybersecurity Small Business Workplace Strategy Microsoft Data Backup Communication Smartphone Saving Money Business Management VoIP Smartphones Android Passwords Mobile Devices communications Backup Data Recovery Upgrade Managed Service Managed IT Services Browser Disaster Recovery Social Media Microsoft Office Network Tech Term Remote Internet of Things Artificial Intelligence Facebook Automation Cloud Computing Covid-19 Managed Service Provider Windows Remote Work Miscellaneous Current Events Gadgets Server Information Holiday Productivity Outsourced IT Employee/Employer Relationship Encryption Spam AI Windows 10 Government Data Management Business Continuity Training Office Compliance Blockchain Windows 10 Bandwidth Virtualization Business Technology Wi-Fi Data Security Apps Two-factor Authentication Mobile Office Mobile Device Management Chrome Gmail Budget Vendor Apple App Employer-Employee Relationship Managed Services Voice over Internet Protocol Networking BDR Office 365 BYOD Applications WiFi Access Control Tip of the week Conferencing Computing Hacker Information Technology Avoiding Downtime How To Marketing Analytics Office Tips Augmented Reality HIPAA Storage Router Password Bring Your Own Device Virtual Private Network Big Data Health Help Desk Operating System Retail Computers Healthcare Risk Management Managed IT Services Website Windows 7 Patch Management IT Support Save Money Microsoft 365 Remote Monitoring Firewall End of Support Vulnerability Vendor Management Solutions The Internet of Things Display Printer Paperless Office Windows 11 Social Infrastructure 2FA Monitoring Going Green Excel Document Management Customer Service Remote Workers Cybercrime Telephone Scam Data loss Cooperation Free Resource Project Management Images 101 Word Multi-Factor Authentication Robot Mobility Telephone System Outlook Cost Management Money Humor IT Management Safety Meetings VPN Employees Physical Security Integration Sports Mouse Modem User Tip Processor Computer Repair Mobile Security Administration Holidays Data Storage Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Customer Relationship Management Saving Time Virtual Machines Professional Services Settings Wireless Printing Content Filtering Hacking Managed IT Service Maintenance Presentation YouTube Downloads Antivirus Cryptocurrency iPhone Wireless Technology Licensing Entertainment Vulnerabilities Data Privacy Virtual Desktop LiFi Data storage Data Analysis Star Wars IT Assessment Hard Drives Windows 8 How To Microsoft Excel IT Maintenance Laptop Gamification Flexibility Domains Drones Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Refrigeration Ransmoware Halloween Content Remote Working Public Speaking Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Health IT Lithium-ion battery Unified Threat Management Directions Videos Assessment Electronic Health Records Hacks Permissions Workforce Entrepreneur Scary Stories Fun Wasting Time Threats Trend Micro Deep Learning Network Congestion Specifications Security Cameras Workplace Strategies User Error Microchip Internet Exlporer Software as a Service Undo Fraud Meta Education Username Managing Costs Amazon Point of Sale eCommerce Black Friday SSID Database Surveillance Mobile Computing Virtual Assistant Outsource IT Media Search Network Management Tech Support IT Technicians Virtual Machine Environment Proxy Server Reviews Cookies Application Best Practice Monitors Cyber Monday Medical IT Tactics Development Hotspot Transportation Small Businesses Buisness Websites Mirgation Hypervisor Displays IT solutions IBM Legal Shopping Nanotechnology Optimization Business Growth PowerPoint SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Chatbots Navigation Cortana Management PCI DSS Lenovo Gig Economy Screen Reader Alt Codes Writing Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Competition Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Downtime Private Cloud Identity Hosted Solution Evernote Paperless Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Typing Co-managed IT Download Net Neutrality Twitter Alerts SQL Server Technology Care Error History User Business Communications Knowledge Financial Data Google Drive Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams 5G Upload Procurement Remote Computing Azure Hybrid Work Cyber security Unified Communications Multi-Factor Security Tech Human Resources Experience Social Network Telework IP Address Google Docs CES Tablet IoT Communitications Bitcoin Dark Web Cables Running Cable Trends Supply Chain Management Google Wallet Alert File Sharing Regulations Recovery Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech

Blog Archive