Unpatched machines targeted by IE 7 attacks
Cybercriminals are already targeting computers which haven't been patched with the most recent Microsoft updates.

A vulnerability in Internet Explorer 7 which Microsoft released an update for last week is already being actively exploited, according to anti-virus vendors.
Microsoft warned at the time that unpatched machines could be compromised if criminals created an attack that took advantage of the flaw referred to as MS09-002 - and it appears that this is already the case.
Vendors including McAfee and Trend Micro, as well as the security training group SANS Institute, confirmed that attacks were being seen in the wild, often in the form of a Word file.
The Word document contains an embedded Active X control, which connects to a website hosting the exploit. This is rigged with malicious script, which can steal information.
Jake Soriano, technical communications for Trend Micro, said on its blog that IE 7 was targeted because it was still the dominant web browser.
He said: "IE7 is used by about every one in every four web users, a much larger share than previous versions of IE. This could explain why cybercriminals seem to be eagerly searching for more bugs."
Last December, a critical vulnerability hit IE, affecting millions of users after hackers quickly pounced on it using SQL injection attacks. That attack was serious enough to warrant an out-of-band patch, as the flaw had also spread to other versions of IE.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd
-
Exploitation of Docker remote API servers has reached a “critical level”
News Hackers are targeting Docker’s remote access API as it allows them to pivot from a single container to the host and deploy malware with ease
By Solomon Klappholz
-
Cyber criminal underground “thriving” as weekly attacks surge by 75% in Q3 2024
Cyber attacks reached another all-time high this quarter as digital crime continues to be a highly profitable industry for threat actors
By Solomon Klappholz
-
Alarm raised over patched Phemedrone Stealer malware that's being used to target Windows PCs - here's what you need to know
News Phemedrone Stealer is being used to exploit a vulnerability in Windows Defender SmartScreen despite the issue being patched in November 2023
By Solomon Klappholz
-
SOC modernization and the role of XDR
Whitepaper Automate security processes to deliver efficiencies across IT
By ITPro
-
Uncovering the ransomware threat from global supply chains
Whitepaper Effectively mitigate ransomware risk
By ITPro
-
The near and far future of ransomware business models
Whitepaper Discover how criminals use ransomware as a cyberweapon
By ITPro
-
Trend Micro security predictions for 2023
Whitepaper Prioritise cyber security strategies on capabilities rather than costs
By ITPro
-
'Potentially unsecured' SMBs are propping up an IT supply chain riddled with ransomware
News More than half of IT supply chains have been impacted by ransomware attacks in recent years and organisations are failing to implement the necessary steps to prevent future damage
By Connor Jones