Resurrecting Internet Explorer: Threat Actors Using Zero-day Tricks in Internet Shortcut File to Lure Victims (CVE-2024-38112)

July 10, 2024, 9:29 a.m.


Check Point Research discovered threat actors leveraging novel techniques to execute malicious code on Windows systems by exploiting Internet Explorer's vulnerabilities. The attackers utilized specially crafted .url files that, when opened, would launch IE and visit attacker-controlled URLs. Additionally, they employed a trick to hide the .hta extension, tricking victims into executing malicious code disguised as a PDF file. This campaign has been active since January 2023, targeting various industries and utilizing multiple MITRE ATT&CK techniques.


Published Created Modified
July 10, 2024, 9:24 a.m. July 10, 2024, 9:24 a.m. July 10, 2024, 9:29 a.m.


Attack Patterns