Network Synergy Blog

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

Before we start making Internet Explorer jokes, we want to mention that there is nothing funny about online threats--particularly those that haven’t been addressed yet by the developers. This newly discovered zero-day threat is called the “Double Kill” Internet Explorer vulnerability. Unfortunately, the Chinese developers who discovered this vulnerability--a computer security company called Qihoo--have been quiet about the details regarding the double-kill IE bug. It’s also difficult to tell if your organization is under threat, as they aren’t revealing any of the warning signs of such an attack.

The only thing known for sure about this threat is that it takes root by using Word documents. It’s likely that this is done through email attachments as well, as email is a major method of transporting threats of all kinds. When the document is opened up, Internet Explorer is opened in the background via some kind of shellcode that downloads an executable file. The vulnerability does all this without showing anything of note to the user, making it a difficult threat to identify, but the effects are well-known. Apparently, the downloaded executable file installs a Trojan horse malware on the user’s device which creates a backdoor into the system.

There are a lot more unknowns than anything else with this vulnerability, though. In particular, professionals aren’t sure if all Word documents are affected by this vulnerability, or if the threat even needs Microsoft Office in order to function as intended. It’s not even known what role Internet Explorer plays in the attack, or if the documents that can trigger this attack are identifiable. All we can tell you is that you need to keep security best practices in mind to keep these kinds of zero-day threats from becoming a problem for your organization.

To start, you should never download an unexpected file from an unexpected sender. This can come in the form of a resume, receipt, or other online document. You can never know for sure what you’re actually downloading, as criminals have been able to spoof email addresses to a dangerous degree in recent years. Just be cautious about everything you can, and augment caution with powerful security tools that can identify potential risks before they become major problems.

To get started with network security, reach out to Network Synergy at 203.261.2201.

Medical IT: How Is HITECH Doing?
Tip of the Week: How to Reduce the Use of Paper in...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, August 17, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Screen Reader User Mobile Technology WPA3 Networking Streaming Media Data Warehousing Recovery Wireless Technology Chatbots Information Office Privacy Mail Merge Money Government Specifications Automation Cyber Monday Scheduling Conferencing Webcam Google Calendar Unsupported Software Application Scam Legal Consumers Black Market Apps Google Asset Tracking Backup The Internet of Things Flexibility Identity Theft GPS CrashOverride Bluetooth Cooperation Facebook Mouse Management Tip of the week Error Outlook Big Data Business Technology Google Analytics Settings Ransomware Avoiding Downtime Cache Patch Management Proactive Technology Data Recovery Smart Tech Battery Digital Payment Microsoft Heating/Cooling Hard Disk Drive HIPAA Motherboard Blockchain Touchscreen Law Firm IT Mobile Office Computer Care Wires Business Intelligence Internet Exlporer Hosted Solution IBM OneNote Assessment Mobile Devices Bring Your Own Device Hacking Managed IT Services Virtual Private Network Files Laptop Alt Codes Superfish Programming Geography Physical Security Hotspot Windows 10 Employer-Employee Relationship Public Cloud Company Culture Google Docs Virtualization Distributed Denial of Service IoT Skype Unified Communications High-Speed Internet Smartphone Vulnerability Google Maps Enterprise Resource Planning Experience Tip of the Work Alerts Windows 8 Tech Support IT budget Network Congestion Windows 8.1 Update Disaster Vendor Management Trending Net Neutrality User Error Identities Cables Typing Android History Supercomputer Firewall Debate Computing Infrastructure Work Station Social Media Monitoring Websites Spyware Scary Stories How To BYOD Google Wallet IT Management Permissions Electronic Medical Records Redundancy Vulnerabilities PC Care SharePoint Passwords USB Meetings Taxes IT Services Thank You Proactive IT Alert Retail Recycling Efficiency Cybersecurity Webinar User Tips Running Cable Memory Data IP Address Business Owner Smart Technology Politics Online Currency Corporate Profile Cryptocurrency Cleaning Crowdsourcing Gaming Console Computers Gadgets Two-factor Authentication Charger Modem Dark Web Router Excel Augmented Reality Disaster Resistance Server Management Computer Accessories Operations Tech Term 3D Printing Bitcoin Document Management Network Print Server Virus Staff Bandwidth Education Virtual Reality IT Support BDR Marketing Black Friday Hacker Licensing Mobility Co-managed IT Data Management Value Backups Cybercrime Going Green Congratulations Business Management Cloud Computing Current Events Information Technology Secruity Data Breach Training Nanotechnology Office Tips iPhone Mobile Device Samsung Processors Hard Drives Password Social Networking Spam Tablet Text Messaging Mobile Security Help Desk Inbound Marketing Fleet Tracking Storage Sports Trainging IT Consulting Employee-Employer Relationship Save Time Competition VPN Phone System Consultation MSP Travel Mobile Health Piracy Refrigeration Intranet Microsoft Excel Writing Mobile Computing Upgrades Browser Utility Computing Compliance Computer Repair Business Computing Mirgation Tip of the Week End of Support Troubleshooting Cookies Point of Sale Time Management Public Speaking Users Data storage Unified Threat Management G Suite Remote Monitoring Healthcare Digital Virtual Desktop Windows 10 Office 365 Logs Language Disaster Recovery Project Management Hardware Tutorials Domains Star Wars Work/Life Balance Data Security IT Solutions Multi-Factor Security Documents Applications Analyitcs Email Content Filtering Food Budget Small Business Halloween Crowdfunding Phishing Fax Server Customer Relationship Management Save Money Knowledge WiFi Chrome Cloud App Fraud communications Lithium-ion Battery CIO Mobile Data Servers IT Technicians Safety Macro Wi-Fi Start Menu Buisness Social Engineering Mobile Device Management Software Business Growth Remote Computing Computing Artificial Intelligence Network Management Administration Web Server Quick Tips Uninterrupted Power Supply VoIP Chromebook People Sync Managed Service Best Practice Connectivity Access Control Enterprise Content Management Managed IT services Digital Signature Tracking Website LinkedIn 5G Software as a Service Cabling Best Available How To Managed IT Service Firefox Leadership Apple Statistics Server Risk Management Technology Tips Emoji Personal Information Antivirus Break Fix Identity Managed IT Cortana Upgrade Regulation Saving Time Video Surveillance Hiring/Firing Entrepreneur Machine Learning Cost Management IT Support Downtime Holiday Saving Money Workplace Tips Printing Migration Monitors Social Word CCTV Remote Workers Drones Encryption Telephone Systems IT Consultant Outsourced IT PDF Business Continuity Technology Laws Security Techology Collaboration SaaS eBay Automobile Managed Service Provider Undo PowerPoint Unified Threat Management Twitter Productivity Presentation Wireless Innovation 3D File Sharing Google Drive Microsoft Office Humor Managing Stress Computer Wearable Technology Display Network Security Legislation Paperless Office Windows Comparison Private Cloud Remote Monitoring and Management Data Loss YouTube Deep Learning Robot Fun Operating System Cameras Remote Support Staffing Lenovo Hackers Relocation Service-based Business Internet of Things LiFi Software Tips Law Enforcement Motion sickness Malware Hard Drive Gadget Development Address IT service Internet Environment Telephony Infrastructure Miscellaneous Shortcut Communication Maintenance Downloads Search Solid State Drive Printer Business Data Backup eWaste Productivity Hacks Notifications Botnet Customer Service Gmail Administrator Regulations Hosted Solutions Best Practices Smartphones

      Latest Blogs

      Every business has some sort of management tasks that requires foresight, and staying up on them can keep headache-inducing situations from constantly causing downtime and costing ...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube