Security News > 2020 > January > Microsoft to Patch Internet Explorer Vulnerability Exploited in Targeted Attacks

Microsoft announced on Friday that it's in the process of developing a patch for a zero-day vulnerability in Internet Explorer that has been exploited in targeted attacks, reportedly by a threat group tracked as DarkHotel.
According to Microsoft, the vulnerability can be exploited for remote code execution in the context of the targeted user.
Microsoft says it has learned about the vulnerability from Google's Threat Analysis Group and Chinese cybersecurity firm Qihoo 360, which have apparently seen the weakness being exploited in limited, targeted attacks.
Qihoo 360 has found evidence suggesting that the vulnerability has been exploited by the DarkHotel threat group, which some believe may be sponsored by South Korea.
Security professionals have advised users to simply stop using Internet Explorer, but as an advisory published last week by Siemens shows, some web-based software can still only run in Internet Explorer.
News URL
Related news
- Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891) (source)
- Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks (source)
- CISA orders agencies to patch BeyondTrust bug exploited in attacks (source)
- Hackers use FastHTTP in new high-speed Microsoft 365 password attacks (source)
- Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation (source)
- Microsoft January 2025 Patch Tuesday fixes 8 zero-days, 159 flaws (source)
- Microsoft fixes under-attack privilege-escalation holes in Hyper-V (source)
- Patch Tuesday: January 2025 Security Update Patches Exploited Elevation of Privilege Attacks (source)
- Ransomware gangs pose as IT support in Microsoft Teams phishing attacks (source)
- 48,000+ internet-facing Fortinet firewalls still open to attack (source)