83r71n<p>In May 2024, Trend Micro's Zero Day Initiative (ZDI) discovered a new vulnerability, CVE-2024-38112, being exploited by the Advanced Persistent Threat (APT) group known as Void Banshee. This vulnerability allowed attackers to execute malicious code on Windows systems by leveraging the MHTML protocol handler and x-usc directives through internet shortcut (.URL) files. Despite Internet Explorer being disabled on most modern Windows systems, Void Banshee found a way to use it to run malicious files, particularly targeting users with the Atlantida info-stealer malware. This malware is designed to steal sensitive data such as passwords and cookies from various applications.</p><p>Void Banshee distributed their malicious files disguised as PDFs within zip archives, tricking victims into thinking they were legitimate documents. These files were spread across cloud-sharing platforms, Discord servers, and online libraries, focusing their attacks primarily in North America, Europe, and Southeast Asia. The discovery of CVE-2024-38112 underscores the ongoing risk posed by outdated Windows features, even after official support has ended, serving as a reminder of the importance of keeping software up to date and vigilant about potential threats.</p><p>To mitigate this vulnerability, Microsoft released patches as part of the July 2024 Patch Tuesday, unregistering the MHTML handler from Internet Explorer to prevent future exploits.</p><p><a href="https://www.trendmicro.com/en_us/research/24/g/CVE-2024-38112-void-banshee.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">trendmicro.com/en_us/research/</span><span class="invisible">24/g/CVE-2024-38112-void-banshee.html</span></a></p><p><a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://ioc.exchange/tags/internetexplorer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internetexplorer</span></a> <a href="https://ioc.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://ioc.exchange/tags/apt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apt</span></a> <a href="https://ioc.exchange/tags/voidbanshee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>voidbanshee</span></a> <a href="https://ioc.exchange/tags/mhtml" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mhtml</span></a> <a href="https://ioc.exchange/tags/protocol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>protocol</span></a> <a href="https://ioc.exchange/tags/url" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>url</span></a> <a href="https://ioc.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://ioc.exchange/tags/atlantida" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>atlantida</span></a> <a href="https://ioc.exchange/tags/pdf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pdf</span></a> <a href="https://ioc.exchange/tags/zip" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zip</span></a> <a href="https://ioc.exchange/tags/discord" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>discord</span></a> <a href="https://ioc.exchange/tags/servers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>servers</span></a> <a href="https://ioc.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://ioc.exchange/tags/trendmicro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trendmicro</span></a> <a href="https://ioc.exchange/tags/zdi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zdi</span></a> <a href="https://ioc.exchange/tags/patchtuesday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>patchtuesday</span></a></p>