Resurrecting Internet Explorer Threat Actors Using Zero-day Tricks in Internet Shortcut File to Lure Victims CVE-2024-38112
Check Point Research discovered threat actors leveraging novel techniques to execute malicious code on Windows systems by exploiting Internet Explorers vulnerabilities. The attackers utilized specially crafted .url files that when opened would launch IE and visit attacker-controlled URLs. Additionally they employed a trick to hide the .hta extension tricking victims into executing malicious code disguised as a PDF file. This campaign has been active since January 2023 targeting various industries and utilizing multiple MITRE ATT&CK techniques.