• Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
What's Hot

Fallout season 2 spoiler-free review: An action-packed return to the wasteland 

December 16, 2025

The Poco F8 Pro review: Flagship thrills without the premium

December 15, 2025

What Is the Real Goal of an Ultimate Gaming PC Build?

December 13, 2025
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
Behind The ScreenBehind The Screen
Home»Security»Google found North Korea used a tragedy to exploit Internet Explorer vulnerability
Security

Google found North Korea used a tragedy to exploit Internet Explorer vulnerability

December 17, 2022No Comments2 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Google found North Korea used a tragedy to exploit Internet Explorer vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email

The Web Explorer internet browser was formally retired again in June earlier this yr and has since been changed by Microsoft Edge. Nevertheless, as TAG’s technical evaluation explains, Workplace remains to be utilizing the IE engine to execute the JavaScript that allows the assault, which is why it labored on Home windows 7 by means of 11 and Home windows Server 2008 by means of 2022 machines that haven’t put in new November 2022 safety updates.

TAG grew to become conscious of the vulnerability when the malicious Microsoft Workplace paperwork titled “221031 Seoul Yongsan Itaewon accident response state of affairs (06:00).docx” had been uploaded to VirusTotal on October thirty first, 2022. The paperwork took benefit of widespread publicity over the tragedy in Itaewon on October twenty ninth by which 151 individuals misplaced their lives in a crowd crush throughout a Halloween celebration in Seoul.

The assault is believed to be the work of a bunch of North Korean government-backed actors often known as APT37

The doc exploited an Web Explorer zero-day vulnerability discovered inside “jscript9.dll,” the JavaScript engine of Web Explorer, which could possibly be used to ship malware or malicious code when rendering an internet site managed by the attacker. TAG attributes the assault to a bunch of North Korean government-backed actors often known as APT37, which has beforehand used comparable Web Explorer zero-day exploits in focused assaults in opposition to North Korean defectors, policymakers, journalists, human rights activists, and South Korean IE customers normally. 

TAG says inside the blog post that it “didn’t recuperate a remaining payload for this marketing campaign” however notes that it beforehand noticed APT37 utilizing comparable exploits to ship malware similar to Rokrat, Bluelight, and Dolphin. On this occasion, the vulnerability was reported to Microsoft inside hours of its discovery on October thirty first and was patched out on November eighth.

See also  1Password 8 arrives on Android and iOS with a big redesign and personalized home

Source link

exploit Explorer Google internet Korea North tragedy Vulnerability
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

I love the Google Pixel wristlet accessory – but it has a big problem

December 6, 2025

I hate to say it, but don’t buy the Google Pixelsnap Stand

October 23, 2025

Google Pixel Watch 4 review: Pebble perfection

October 17, 2025

Google Pixel 10 Pro Fold review: Refinement, not revolution

October 8, 2025
Add A Comment

Comments are closed.

Editors Picks

Pegasus Spyware Remains a Threat as Researchers Discover New ‘Zero-Click’ Attacks

April 19, 2023

The Last of Us Part 1 will feature plenty of accessibility options

August 26, 2022

Here are the Best iPhone 15 Carrier Deals for Black Friday

November 25, 2023

Ezviz RE5 Plus Robot Vacuum and Mop Combo review

September 12, 2024

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Fallout season 2 spoiler-free review: An action-packed return to the wasteland 

The Poco F8 Pro review: Flagship thrills without the premium

What Is the Real Goal of an Ultimate Gaming PC Build?

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.fr - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.