Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

Before we start making Internet Explorer jokes, we want to mention that there is nothing funny about online threats--particularly those that haven’t been addressed yet by the developers. This newly discovered zero-day threat is called the “Double Kill” Internet Explorer vulnerability. Unfortunately, the Chinese developers who discovered this vulnerability--a computer security company called Qihoo--have been quiet about the details regarding the double-kill IE bug. It’s also difficult to tell if your organization is under threat, as they aren’t revealing any of the warning signs of such an attack.

The only thing known for sure about this threat is that it takes root by using Word documents. It’s likely that this is done through email attachments as well, as email is a major method of transporting threats of all kinds. When the document is opened up, Internet Explorer is opened in the background via some kind of shellcode that downloads an executable file. The vulnerability does all this without showing anything of note to the user, making it a difficult threat to identify, but the effects are well-known. Apparently, the downloaded executable file installs a Trojan horse malware on the user’s device which creates a backdoor into the system.

There are a lot more unknowns than anything else with this vulnerability, though. In particular, professionals aren’t sure if all Word documents are affected by this vulnerability, or if the threat even needs Microsoft Office in order to function as intended. It’s not even known what role Internet Explorer plays in the attack, or if the documents that can trigger this attack are identifiable. All we can tell you is that you need to keep security best practices in mind to keep these kinds of zero-day threats from becoming a problem for your organization.

To start, you should never download an unexpected file from an unexpected sender. This can come in the form of a resume, receipt, or other online document. You can never know for sure what you’re actually downloading, as criminals have been able to spoof email addresses to a dangerous degree in recent years. Just be cautious about everything you can, and augment caution with powerful security tools that can identify potential risks before they become major problems.

To get started with network security, reach out to Symmetric Engineering Group at (813) 749-0895.

 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Search

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Managed IT Services Best Practices Cloud IT Infrastructure Management Technology Business Continuity IT Companies in Tampa Business Computing Email Hackers Malware IT Support Services Privacy Business Mobility Business IT Solutions I.T. Management Productivity Microsoft IT Professional Services Custom Business Solutions Hosted Solutions Internet Managed Service Provider Business Outsourced IT IT Business Solutions Business Applications IT Management Software Mobile Devices Ransomware Computer Network Security Technology Consultants Data Backup Managed IT Service in Florida Windows 10 Android Business IT Support Managed IT Managed IT Service Data Recovery Managed Services in Florida I.T. Support Windows User Tips IT Risk Management Data Cloud Computing IT Support Services in Tampa Internet of Things Backup Dynamic Solutions I.T. Services Disaster Recovery Smartphone Google Browser Remote Monitoring Data Management Communication IT Outsourcing in Tampa IT Services in Florida Small Business IT Service Managed Services IT Support in Tampa Hardware Server Managed Services in Tampa Bay Microsoft Office IT Managed Services Social Media Smartphones Innovation Gmail Holiday Upgrade Encryption Artificial Intelligence Cybersecurity App Workplace Tips Network Firewall Tech Companies in Tampa Office 365 Vendor Management Tech Term Mobile Device Management IT Services in Tampa Mobile Device Phishing Business Management BYOD Tampa IT Support Productivity Antivirus Operating System Managed Service in Tampa IT Outsourcing Infrastructure Efficiency Business IT Support Services Applications Tip of the week IT Outsourcing in Florida Unified Threat Management Small Business IT Solutions Content Filtering Save Money Computer Networking Apple IT Vendor Management Passwords Risk Management Collaboration Website Data Computer Services IT Service Management Word IT Company Business Plan IT Management Services Analytics Mobile Computing Hosted Solution Windows 10 IT Company Data storage Robot SaaS Miscellaneous Government IT solutions Automation Big Data Facebook Bring Your Own Device BDR Bandwidth Customer Relationship Management Settings Money Wireless Technology Compliance Computer Hardware Repair Data loss Retail IT Support Project Management WiFi Paperless Office Vulnerability The Internet of Things Data Security Saving Money Remote Computing Regulations Telephone Systems Chrome Managed IT Services Two-factor Authentication Assessment Virtual Private Network IT Support Helpdesk Computing Virtual Reality IT Companies in Florida Virtualization Mobility Maintenance Business Technology Microsoft Virtual Server Hosting in Tampa and Florida YouTube Spam Office Tips IT Management Service Search Apps communications Outlook Net Neutrality Recovery HIPAA Uninterrupted Power Supply End of Support Managed IT Outsourcing User Error Training Licensing Presentation Unified Communications Information Technology Budget Scam Internet Exlporer Business Continuity Services VPN Business Application Document Management Laptop Redundancy IBM Solid State Drive Flexibility Employer-Employee Relationship LiFi Alert Mobile Security Digital Payment Server Management Augmented Reality Network Management Wireless Google Drive Customer Service VoIP Monitors Computer Network Services Mouse Network Congestion Computer Support Smart Technology I.T. Company Help Desk Tablet Administration Storage Virtual Desktop Office IT Consulting Computer Networking Services History Hacker User Downtime Save Time IT Company in Tampa Websites Unified Threat Management Operations Cabling Experience Domains Deep Learning Microsoft Business Solutions Healthcare IT Tech Company in Tampa Distributed Denial of Service Smart Tech Politics Techology Language Google Maps Bluetooth Business Growth Competition Dark Data Cryptocurrency Humor Cyber Monday Router Digital Best Practice Trending Lenovo Permissions Digital Signature Hard Drives Co-managed IT Social Engineering Help Desk Support in Tampa Google Calendar Chatbots Hard Drive Halloween Tampa IT Services IT Tech Support Hacks Break Fix Connectivity Consultation Disaster Avoiding Downtime Careers Backups Managed Service in Florida Printer Wearable Technology Mail Merge Public Speaking Health Care IT Services Google Wallet Disaster Resistance Computing Infrastructure Consulting Services Bitcoin Modem Spyware Heating/Cooling CIO Server Hosting in Tampa Superfish Fraud Business Continuity Service Providers Help Desk Support Automobile Legislation Identity Corporate Profile Cache Scary Stories Outsourced Computer Support Technology Consulting Firms Current Events Dark Web IoT Quick Tips Gadgets Users IT Service in Tampa Jobs Information Technology Consulting Legal Machine Learning Access Control Address Programming Identities Computers Business IT Solutions Drones Proactive IT Alerts Shortcut Application Service IT Windows 8 Professional Service Software as a Service Cookies Going Green Servers Cost Management Comparison WannaCry Sports Computer Repair Samsung Data Warehousing Time Management Safety Marketing IT Consulting Services IT Support Companies in Tampa SharePoint IT Technicians Hard Disk Drive Intranet Star Wars Tech Support Top IT Outsourcing Company Display Full Service IT File Sharing Data Breach Cooperation Software Tips Patch Management Health Cortana IT Solutions for Small Business IT Managed Service Provider Managed it Services in Tampa Travel Technology Tips Nanotechnology How To Printing Server Hosting Networking USB Education IT Consulting Service IT Vendor Management in Tampa Sync Specifications Social Networking Password Microsoft Excel Identity Theft Hacking Data Technology IT Support and Solutions Downloads Mirgation Utility Computing Alt Codes Managed Services in Floirda Files Technology Laws Staff Knowledge Microsoft Affiliate Program Managed Service Providers Screen Reader Computer Care Firefox Hotspot Statistics Fun Undo Network Support in Florida Mobile Device Managment Black Friday Motherboard VoIP Buisness Blockchain Touchscreen Wi-Fi Writing Google Docs IT Managed Service in Tampa Multi-Factor Security Migration Healthcare Typing Server Hosting in Florida Social Staffing Personal Information Mobile Data Meetings How To CCTV Crowdsourcing 5G Public Cloud Congratulations GPS IP Address Botnet Virus Twitter Webcam Telephony Upgrades G Suite Taxes Supercomputer IT Consultant Refrigeration Processors Point of Sale Tracking Mobile Office Emoji Update Hiring/Firing 3D Printing Black Market CrashOverride Managed Servers Work/Life Balance IT Budget Business Appplications Administrator Recycling Web Server Electronic Medical Records Relocation Chromebook Cleaning Law Enforcement Lithium-ion Battery Saving Time eWaste Notifications Private Cloud Cybercrime I.T. Managament Unsupported Software Motion Sickness Gadget Cameras Physical Security Error Thank You Emergency Running Cable

Latest Blog Entry

Artificial intelligence is perhaps most commonly known as a malevolent force, thanks to popular culture. HAL 9000, Ultron, and many others have reinforced that A.I. will be the downfall of humanity. In reality, however, A.I. holds more potential utility as a key implementati...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login