ScarCruft used a technique involving pop-up ads to trick victims into clicking on a malicious link. Once infected, the malware captured sensitive data including files, keystrokes, and screenshots.

The zero-day vulnerability used in the attack was tracked as CVE-2024−38,178 and was patched by Microsoft in August 2024. However, researchers found that ScarCruft’s exploit was similar to those it has used in the past; This suggests that the group may have been monitoring Microsoft security updates and adapted its tactics accordingly.

According to the media, the attack underscores that Internet Explorer still poses a threat even after it has been officially discontinued. Therefore, many third-party applications continue to use outdated browser components, leaving them open to abuse.

Source: Ferra

Previous articleRambler&Co wins the “1C: Project of the Year” competition with a unique mobile solution for document flowIn Russia October 18, 2024, 16:16
Next articleIn their case, the turbocharged engine produced 245 hp.
I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.

LEAVE A REPLY

Please enter your comment!
Please enter your name here