Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

Before we start making Internet Explorer jokes, we want to mention that there is nothing funny about online threats--particularly those that haven’t been addressed yet by the developers. This newly discovered zero-day threat is called the “Double Kill” Internet Explorer vulnerability. Unfortunately, the Chinese developers who discovered this vulnerability--a computer security company called Qihoo--have been quiet about the details regarding the double-kill IE bug. It’s also difficult to tell if your organization is under threat, as they aren’t revealing any of the warning signs of such an attack.

The only thing known for sure about this threat is that it takes root by using Word documents. It’s likely that this is done through email attachments as well, as email is a major method of transporting threats of all kinds. When the document is opened up, Internet Explorer is opened in the background via some kind of shellcode that downloads an executable file. The vulnerability does all this without showing anything of note to the user, making it a difficult threat to identify, but the effects are well-known. Apparently, the downloaded executable file installs a Trojan horse malware on the user’s device which creates a backdoor into the system.

There are a lot more unknowns than anything else with this vulnerability, though. In particular, professionals aren’t sure if all Word documents are affected by this vulnerability, or if the threat even needs Microsoft Office in order to function as intended. It’s not even known what role Internet Explorer plays in the attack, or if the documents that can trigger this attack are identifiable. All we can tell you is that you need to keep security best practices in mind to keep these kinds of zero-day threats from becoming a problem for your organization.

To start, you should never download an unexpected file from an unexpected sender. This can come in the form of a resume, receipt, or other online document. You can never know for sure what you’re actually downloading, as criminals have been able to spoof email addresses to a dangerous degree in recent years. Just be cautious about everything you can, and augment caution with powerful security tools that can identify potential risks before they become major problems.

To get started with network security, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 November 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Hardware Internet IT Support Efficiency User Tips Malware Privacy Email Phishing Workplace Tips Google Computer Collaboration IT Services Users Hosted Solutions Ransomware Quick Tips Mobile Device Cybersecurity Small Business Microsoft Workplace Strategy Data Backup Communication Saving Money Smartphone VoIP Business Management Smartphones Android Mobile Devices communications Backup Data Recovery Managed IT Services Managed Service Passwords Microsoft Office Upgrade Browser Social Media Disaster Recovery Network Tech Term Internet of Things Remote Artificial Intelligence Facebook Automation Cloud Computing Covid-19 Remote Work Managed Service Provider Miscellaneous Gadgets Windows Server Outsourced IT Information Employee/Employer Relationship Current Events Encryption Spam Productivity Holiday Windows 10 Business Continuity Data Management Government Office Windows 10 Virtualization Compliance Wi-Fi Training Blockchain AI Business Technology Mobile Office Bandwidth Data Security Apps Two-factor Authentication Vendor Chrome Mobile Device Management Budget Gmail Apple Networking Managed Services App Voice over Internet Protocol Employer-Employee Relationship Tip of the week Applications How To WiFi Conferencing BDR BYOD Computing Information Technology Hacker Access Control Avoiding Downtime Office 365 Router Office Tips Analytics Website Marketing Augmented Reality Retail Storage Password Help Desk Bring Your Own Device Managed IT Services Big Data Healthcare Operating System Virtual Private Network Risk Management Computers Health HIPAA IT Support Document Management Firewall Windows 11 2FA Scam Monitoring Data loss Excel The Internet of Things Remote Workers Going Green Patch Management Social Telephone Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Cooperation Free Resource Project Management Customer Service Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Solutions Outlook Employees Machine Learning Integration Money Modem Word Humor User Tip Processor Mobile Security Holidays Maintenance Antivirus Sports Mouse Data Storage Smart Technology Supply Chain Safety Video Conferencing Administration Managed Services Provider Virtual Machines Professional Services Saving Time Managed IT Service Robot Downloads Settings iPhone Printing Licensing Wireless Content Filtering Entertainment IT Management Customer Relationship Management Vulnerabilities VPN YouTube Meetings Data Privacy Images 101 Cryptocurrency Hacking Multi-Factor Authentication Computer Repair Mobility Telephone System Presentation Cost Management Virtual Desktop Data storage LiFi Wireless Technology Trend Micro Electronic Medical Records Specifications Security Cameras Workplace Strategies SharePoint Microchip Internet Exlporer Software as a Service Halloween Recovery Fraud Meta Lenovo Username Hard Drives Managing Costs Amazon Writing eCommerce Virtual Reality Black Friday SSID Domains Hacks Server Management Database Surveillance Scary Stories Private Cloud Virtual Assistant Outsource IT Media Superfish Identity Theft Refrigeration IT Technicians Virtual Machine Environment Fun Cookies Twitter Cyber Monday Medical IT Proxy Server Reviews Deep Learning Public Speaking Lithium-ion battery Tactics Development Error Hotspot Transportation Small Businesses Education Mirgation Hypervisor Displays Social Engineering Entrepreneur Nanotechnology Optimization Remote Computing PowerPoint Shopping Mobile Computing Addiction Language Employer/Employee Relationships Outsourcing Navigation Management PCI DSS Tablet Undo Chatbots Search Screen Reader Alert Distributed Denial of Service Workplace Gig Economy Best Practice Managed IT Service Level Agreement Internet Service Provider Buisness File Sharing Computing Infrastructure Teamwork Hiring/Firing Dark Data Evernote Paperless Legal Regulations Compliance IT solutions Identity How To Smart Tech Memes Notifications Co-managed IT Bookmark Business Growth Download Net Neutrality Travel Application Alerts SQL Server Technology Care Business Communications Techology Financial Data Google Maps History Cortana Browsers Smartwatch Alt Codes IBM Connectivity IT Break Fix Scams Upload Procurement Downtime Unified Threat Management Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Unified Threat Management Social Network Telework Hosted Solution CES Typing IoT Communitications Dark Web Cables Trends Supply Chain Management Network Congestion Regulations Knowledge Physical Security Google Calendar Term Google Apps Google Drive User Error Customer Resource management FinTech Competition Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Gamification Flexibility Point of Sale Staff Value Business Intelligence 5G Social Networking Experience Legislation Shortcuts Google Docs Organization Unified Communications Fileless Malware Digital Security Cameras Bitcoin Network Management Smart Devices Running Cable Tech Support User Ransmoware Google Wallet Content Remote Working Wearable Technology Memory Vendors Monitors Motherboard Data Breach Comparison Google Play Be Proactive Health IT Directions Videos Windows 8 IP Address Assessment Electronic Health Records Laptop Websites Permissions Workforce Drones Wasting Time Threats

Blog Archive