{"id":116360,"date":"2019-01-02T17:26:25","date_gmt":"2019-01-02T17:26:25","guid":{"rendered":"http:\/\/sftarticles.wpenginepowered.com\/en\/?p=116360"},"modified":"2025-07-01T22:35:12","modified_gmt":"2025-07-02T05:35:12","slug":"internet-explorer-attack","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/internet-explorer-attack\/","title":{"rendered":"This is the scariest Internet Explorer bug we\u2019ve ever seen"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-116595 size-large\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2019\/01\/microsoft-explorer-1024x576.jpg\" alt=\"microsoft internet explorer\" width=\"840\" height=\"473\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/microsoft-explorer-1024x576.jpg 1024w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/microsoft-explorer-300x169.jpg 300w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/microsoft-explorer-768x433.jpg 768w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/microsoft-explorer-800x450.jpg 800w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/microsoft-explorer-664x374.jpg 664w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/microsoft-explorer-238x134.jpg 238w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/microsoft-explorer-436x246.jpg 436w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/microsoft-explorer-370x208.jpg 370w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/microsoft-explorer-304x170.jpg 304w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/microsoft-explorer-1200x675.jpg 1200w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/microsoft-explorer.jpg 1280w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><\/p>\n<p>Internet Explorer is an old browser, sure, and there are definitely plenty of better options out there. But that doesn\u2019t mean there aren\u2019t a lot of reasons for people to keep using it. If you are one of those people who still uses Internet Explorer for one of those reasons, then we have some very important news for you. You need to update Internet Explorer immediately.<\/p>\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" alt=\"Internet Explorer\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-logo-l,f_auto,dpr_auto\/p\/3ceb6c76-96d0-11e6-a8c0-00163ed833e7\/1455953583\/internet-explorer-10-1043px-Internet_Explorer_10+11_logo.svg.png\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Internet Explorer<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/internet-explorer-10.en.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\">Download<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--60\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"60\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"6\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\">6<\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/internet-explorer-10.en.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n<h2>Google has discovered a bug in Internet Explorer that allows hackers to gain control of the PC running it<\/h2>\n<p>The search giant, Google, has a special team tasked with searching out security threats across all software and programs. This team is called the Threat Analysis Group, and a member of Google\u2019s team recently spotted a rather large vulnerability in Internet Explorer\u2019s code. The particular type of threat is known as a remote code execution flaw.&nbsp;<a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-8653#ID0EN\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft explains<\/a>:<\/p>\n<p>\u201cThe vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user\u2026 An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.\u201d<\/p>\n<div class=\"sc-card-starred-link\">\r\n  <div class=\"sc-card-starred-link__body\">\r\n    <div class=\"sc-card-starred-link__row clearfix\">\r\n      <div class=\"sc-card-starred-link__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-starred-link__img\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2017\/11\/security-192.jpg\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-starred-link__col-title\">\r\n        <p class=\"sc-card-starred-link__title\">How to enable private browsing mode on different browsers<\/p>\r\n        <a class=\"sc-card-starred-link__button\" href=\"https:\/\/en.softonic.com\/articles\/how-to-enable-private-browsing-mode-on-all-browsers\" target=\"_blank\" rel=\"noopener noreferrer sponsored\">Read now<\/a>\r\n      <\/div>\r\n    <\/div>\r\n    <a class=\"sc-card-starred-link__link\" href=\"https:\/\/en.softonic.com\/articles\/how-to-enable-private-browsing-mode-on-all-browsers\" target=\"_blank\" rel=\"noopener noreferrer sponsored\"><\/a>\r\n  <\/div>\r\n<\/div>\n<p>This all means that if you are still using Microsoft Internet Explorer on any version of Windows, and you haven\u2019t downloaded and installed Microsoft\u2019s latest security update, <strong>your whole computer could be at risk.<\/strong><\/p>\n<p>If you are logged into Windows as an admin user, then the hacker could then gain the same admin privileges on the machine by exploiting the vulnerability. This would give them the ability to create new accounts, install new software, and even copy or delete your data. The scariest thing of all is that the vulnerability doesn\u2019t need any new software downloading to do any of this.<\/p>\n<p>All that is needed is for the users to click on a website that is designed to take advantage of the security flaw. This means that the flaw makes Internet Explorer users much more vulnerable than victims of <a href=\"https:\/\/en.softonic.com\/articles\/how-to-detect-fakescam-emails-and-avoid-phishing-attacks-hi-res-version\">regular phishing attacks<\/a>, which often require the downloading of compromised software. In a <a href=\"https:\/\/blogs.technet.microsoft.com\/msrc\/2018\/12\/19\/december-2018-security-update-release-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">post describing the security flaw<\/a>, Microsoft outlined a scenario that would see hackers taking remote control of a victim\u2019s PC. In the scenario, the specially designed website was promoted via email and merely clicking the link left the victim\u2019s PC wide open.<\/p>\n<div class=\"sc-card-starred-link\">\r\n  <div class=\"sc-card-starred-link__body\">\r\n    <div class=\"sc-card-starred-link__row clearfix\">\r\n      <div class=\"sc-card-starred-link__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-starred-link__img\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2017\/06\/seguridad-diaria-1024x576.jpg\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-starred-link__col-title\">\r\n        <p class=\"sc-card-starred-link__title\">The 7 security tips you really need to know<\/p>\r\n        <a class=\"sc-card-starred-link__button\" href=\"https:\/\/en.softonic.com\/articles\/every-day-tips-security-eng\/\" target=\"_blank\" rel=\"noopener noreferrer sponsored\">Read now<\/a>\r\n      <\/div>\r\n    <\/div>\r\n    <a class=\"sc-card-starred-link__link\" href=\"https:\/\/en.softonic.com\/articles\/every-day-tips-security-eng\/\" target=\"_blank\" rel=\"noopener noreferrer sponsored\"><\/a>\r\n  <\/div>\r\n<\/div>\n<p>Fortunately, Microsoft has already created a security patch for Internet Explorer that closes the vulnerability. If you allow Windows to automatically update your system, then there is a very good chance that this serious flaw has already been corrected. If not, however, you\u2019ll be able to <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-8653#ID0EN\" target=\"_blank\" rel=\"noopener noreferrer\">find out more details about the flaw and how to correct it here<\/a>. We suggest you do so immediately.<\/p>\n<!-- Shortcode [playwire] does not match the conditions -->\n","protected":false},"excerpt":{"rendered":"<p>Google has discovered a bug in Internet Explorer allow a hacker to gain control of the PC running it<\/p>\n","protected":false},"author":9073,"featured_media":116595,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[1015],"tags":[1072,1126,1027,1080],"usertag":[839],"vertical":[],"content-category":[],"class_list":["post-116360","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-microsoft","tag-online","tag-security","tag-windows","usertag-vpn"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/116360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9073"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=116360"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/116360\/revisions"}],"predecessor-version":[{"id":326840,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/116360\/revisions\/326840"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/116595"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=116360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=116360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=116360"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=116360"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=116360"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=116360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}