Exploits for nasty Internet Explorer bug found on hacking forums

Representational image depecting cybersecurity protection
(Image credit: Shutterstock)

In addition to sharing working exploits, threat actors are not sharing tutorials to help others fabricate their own attacks that make use of the recently discovered zero-day vulnerability in Internet Explorer’s browser engine Trident, also known as MSHTML, according to reports.

Microsoft disclosed the vulnerability, tracked as CVE-2021-40444, last week saying that it could be weaponized through malicious documents with ActiveX content to execute commands on a victim's computer remotely.

Soon after Microsoft’s disclosure, security researchers were able to spot documents on the internet with ActiveX content designed specifically to take advantage of CVE-2021-40444.

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

BleepingComputer now reports that threat actors have started circulating guides and information regarding the vulnerability on underground hacking forums to help other malicious users craft exploits based on CVE-2021-40444.

No cure, only mitigations

Although software companies don’t disclose a vulnerability, until it has been fixed, Microsoft’s hand was forced after security vendors EXPMON and Mandiant both spotted the vulnerability being exploited. 

In response, Microsoft decided to disclose the vulnerability and shared mitigations, which involve blocking ActiveX controls and Microsoft Office document previews in Windows Explorer, to defang the exploit, even as the software giant works to create a patch to plug the vulnerability. 

However, researchers have since been able to modify the exploit not to use ActiveX, effectively bypassing Microsoft's mitigations. Threat actors reportedly had already discovered this workaround, and used it to create more spurious documents and instructions. 

The information is reportedly simple to follow and enables anyone to create their own working version of the CVE-2021-40444 exploit.

The good news however is that security programs such as Microsoft Defender have been equipped to detect and flag such malicious documents, which is the best users can hope for in the absence of an official fix.

Via BleepingComputer

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Read more
Avast cybersecurity
An unpatched Windows zero-day flaw has been exploited by 11 nation-state attackers
A digital representation of a lock
Security experts are being targeted with fake malware discoveries
A pair of hands using a keyboard
Microsoft SharePoint hijacked to spread Havoc malware
The best free firewall
Microsoft fixes Power Pages security flaw, tells users to be on their guard
Flag of the People&#039;s Republic of China overlaid with a technological network of wires and circuits.
One of the biggest flaws exploited by Salt Typhoon hackers has had a patch available for years
Representational image depecting cybersecurity protection
Hackers are breaking SonicWall products to target business networks
Latest in Security
ransomware avast
Ransomware attacks are costing Government offices a month of downtime on average
Lock on Laptop Screen
Data breach at Pennsylvania education union potentially exposes 500,000 victims
Data leak
Top collectibles site leaks personal data of nearly a million users
Spyware
Stalkerware data breach potentially hits over 2 million users, including thousands of Apple devices
An American flag flying outside the US Capitol building against a blue sky
Five Eyes "cannot replace US intel in Ukraine", claims former US Cyber Command Chief
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Criminals are using a virtual hard disk image file to host and distribute dangerous malware
Latest in News
Apple iPhone 16 Pro Max REVIEW
The latest batch of leaked iPhone 17 dummy units appear to show where glass meets metal on the new designs
Hornet swings their weapon in mid air
Hollow Knight: Silksong could potentially launch this year and I reckon it could be a great game for an Xbox handheld
ransomware avast
Ransomware attacks are costing Government offices a month of downtime on average
Cassian looking at someone off-camera from a TIE fighter cockpit in Andor season 2
Star Wars: Andor creator is taking a stance against AI by canceling plans to release its scripts, and I completely get why
Nintendo x Seattle Mariners partnership
The Nintendo Switch 2 logo will be featured on the Seattle Mariners' baseball jerseys this season
Apple iPhone 16 Pro Max Review
Siri's chances to beat ChatGPT just got a whole lot better