Skip to main content

The context you need, when you need it

When news breaks, you need to understand what actually matters — and what to do about it. At Vox, our mission to help you make sense of the world has never been more vital. But we can’t do it on our own.

We rely on readers like you to fund our journalism. Will you support our work and become a Vox Member today?

Join now

New Vulnerability Hits Internet Explorer, and It’s Serious

More than half of the world’s browsers are affected. Be careful where you click.

Ken Wolter/Shutterstock

A newly discovered flaw affecting several versions of Microsoft’s Internet Explorer has left a significant portion of the world’s web browsers vulnerable to attack.

Disclosed in an unusual Saturday alert from Microsoft, the flaw is being called a serious “Zero Day” vulnerability by security company FireEye, which claims it affects more than 56 percent of the world’s web browsers currently in use.

It’s a remote code execution vulnerability, which in English means a bad guy can make a target computer run software after a successful attack. “The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer,” Microsoft’s alert reads. The phrase “arbitrary code” means pretty much any software that the attacker chooses to run.

In a post to its Security Response Center blog, Microsoft explains that the company has so far seen only “limited attacks” exploiting the vulnerability. It says attacks typically occur when a target has been convinced to click on a link.

FireEye, in a post of its own has declared the exploit a zero-day vulnerability, so named because they’re undisclosed or leave potential victims with zero days of warning. The company claims a gang of attackers has already launched a campaign exploiting the flaw.

Microsoft’s full security advisory goes into more detail, explaining that the vulnerability affects every version of the browser from Internet Explorer 6 through 11. FireEye says that most attacks are targeting IE9 through 11, which together account for more than 26 percent of the web browsers currently in use around the world. But when you add in IE versions 6 through 8, you’re talking about more like 56 percent.

Microsoft says that Internet Explorer 10 and 11 with Enhanced Protected Mode — which is enabled by default on those browsers — protects against attacks exploiting the vulnerability. The company is still investigating the matter and will provide an update when it’s complete.

FireEye goes into further detail, saying the vulnerability originates in Flash, the animation and video software from Adobe, and can be exploited using a well-known technique (Many technical details here) to access a computer’s memory, where malignant code can be deployed.

In one scenario, an attacker can create a website that is specifically designed to take advantage of this vulnerability, and then convince people using Explorer to click through. So if you use Explorer, be on the lookout for suspicious-looking email messages with Web links in them.

So who’s behind the attacks FireEye says are exploiting this new vulnerability? The company doesn’t go into a lot of detail, but it does say it’s an APT Group, which stands for “Advanced Persistent Threat.” FireEye generally saves that designation for the most serious and technically sophisticated of attackers.

“The APT group responsible for this exploit has been the first group to have access to a select number of browser-based Zero-Day exploits in the past,” FireEye explains. “They are extremely proficient at lateral movement and are difficult to track, as they typically do not reuse command and control infrastructure.”

FireEye says this same group was tied to a backdoor vulnerability known as Pirpi that appeared in 2010.

This article originally appeared on Recode.net.

More in Technology

Podcasts
Are humanoid robots all hype?Are humanoid robots all hype?
Podcast
Podcasts

AI is making them better — but they’re not going to be doing your chores anytime soon.

By Avishay Artsy and Sean Rameswaram
Future Perfect
The old tech that could help stop the next airborne pandemicThe old tech that could help stop the next airborne pandemic
Future Perfect

Glycol vapors, explained.

By Shayna Korol
Future Perfect
Elon Musk could lose his case against OpenAI — and still get what he wantsElon Musk could lose his case against OpenAI — and still get what he wants
Future Perfect

It’s not about who wins. It’s about the dirty laundry you air along the way.

By Sara Herschander
Life
Why banning kids from AI isn’t the answerWhy banning kids from AI isn’t the answer
Life

What kids really need in the age of artificial intelligence.

By Anna North
Culture
Anthropic owes authors $1.5B for pirating work — but the claims process is a Kafkaesque messAnthropic owes authors $1.5B for pirating work — but the claims process is a Kafkaesque mess
Culture

“Your AI monster ate all our work. Now you’re trying to pay us off with this piece of garbage that doesn’t work.”

By Constance Grady
Future Perfect
Some deaf children are hearing again because of a new gene therapySome deaf children are hearing again because of a new gene therapy
Future Perfect

A medical field that almost died is quietly fixing one disease at a time.

By Bryan Walsh