|03 Oct 2013||#1|
| || |
Three new attacks using IE zero-day exploit
Attackers are continuing to pile on a critical Internet Explorer zero day that remains unpatched two weeks after it was reported.
During the last two weeks, it appears that at least three separate targeted attack campaigns have been using the same bug previously used by Operation Deputy Dog, a campaign that wound up compromising Japanese media outlets and tech systems in the middle of September.
Researchers at FireEye initially discovered the DeputyDog campaign – which leveraged the CVE-2013-3893 vulnerability – a little over a week ago. Now word comes that three other, unconnected campaigns, Taidoor, th3bug and Web2Crew are also using the same exploit.
|My System Specs|
|Similar help and support threads for2: Three new attacks using IE zero-day exploit|
|Exploit-Blacole.gq | Could our PC be infected (Still)||System Security|
|Multi-stage exploit attacks for more effective malware delivery||Security News|
|JAVA Exploit Remedy?||System Security|
|I E Exploit||Browsers & Mail|
|Antivirus Suites Struggle to Block Exploit-based Attacks||Security News|
|What is the pdf.exploit that my scanner keeps talking about||System Security|
|Exploit Eleonore Exploit Kit (type 1194) help!||System Security|
|Our Sites ||Site Links ||About Us ||Find Us |
© Designer Media Ltd
All times are GMT -5. The time now is 10:48 PM.