Windows MSHTML Zero-Day seit über einem Jahr für Malware-Angriffe genutzt

Teilen:

Microsoft fixed a Windows zero-day vulnerability that has been actively exploited in attacks for eighteen months to launch malicious scripts while bypassing built-in security features.

The flaw, tracked as CVE-2024-38112, is a high-severity MHTML spoofing issue fixed during the July 2024 Patch Tuesday security updates.

Haifei Li of Check Point Research discovered the vulnerability and disclosed it to Microsoft in May 2024.

However, in a report by Li, the researcher notes that they have discovered samples exploiting this flaw as far back as January 2023.

Internet Explorer is gone, but not really

Haifei Li discovered that threat actors have been distributing Windows Internet Shortcut Files (.url) to spoof legitimate-looking files, such as PDFs, but that download and launch HTA files to install password-stealing malware.

An Internet Shortcut File is simply a text file that contains various configuration settings, such as what icon to show, what link to open when double-clicked, and other information. When saved as a .url file and double-clicked, Windows will open the configured URL in the default web browser.

However, the threat actors discovered that they could force Internet Explorer to open the specified URL by using the mhtml: URI handler in the URL directive, as shown below.

MHTML is a ‘MIME Encapsulation of Aggregate HTML Documents’ file, a technology introduced in Internet Explorer that encapsulates an entire webpage, including its images, into a single archive.

When the URL is launched with the mhtml: URI, Windows automatically launches it in Internet Explorer instead of the default browser.

According to vulnerability researcher Will Dormann, opening a webpage in Internet Explorer offers additional benefits to threat actors, as there are fewer security warnings when downloading malicious files.

“First, IE will allow you to download a .HTA file from the internet without warning,” explained Dormann on Mastodon.

“Next, once it’s downloaded, the .HTA file will live in the INetCache directory, but it will NOT explicitly have a MotW. At this point, the only protection the user has is a warning that “a website” wants to open web content using a program on the computer.”

“Without saying which website it is. If the user believes that they trust “this” website, this is when code execution happens.”

Essentially, the threat actors take advantage of the fact that Internet Explorer is still included by default on Windows 10 and Windows 11.

Despite Microsoft announcing its retirement roughly two years back and Edge replacing it on all practical functions, the outdated browser can still be invoked and leveraged for malicious purposes.

Check Point says that the threat actors are creating Internet Shortcut files with icon indexes to make them appear as links to a PDF file.

When clicked, the specified web page will open in Internet Explorer, which automatically attempts to download what appears to be a PDF file but is actually an HTA file.

However, the threat actors can hide the HTA extension and make it appear like a PDF is being downloaded by padding the filename with Unicode characters so the .hta extension is not displayed, as shown below.

When Internet Explorer downloads the HTA file, it asks if you wish to save or open it. If a user decides to open the file thinking it’s a PDF, as it does not contain the Mark of the Web, it will launch with only a generic alert about the content opening from a website.

As the target expects to download a PDF, the user may trust this alert, and the file is allowed to run.

Check Point Research told BleepingComputer that allowing the HTA file to run would install the Atlantida Stealer malware password-stealing malware on the computer.

Once executed, the malware will steal all credentials stored in the browser, cookies, browser history, cryptocurrency wallets, Steam credentials, and other sensitive data.

Microsoft has fixed the CVE-2024-38112 vulnerability by unregistering the mhtml: URI from Internet Explorer, so it now opens in Microsoft Edge instead.

CVE-2024-38112 is similar to CVE-2021-40444, a zero-day vulnerability that abused MHTML that North Korean hackers leveraged to launch attacks targeting security researchers in 2021.

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
11:22 pm, Juni 30, 2025
Wetter-Symbol 25°C
L: 23° | H: 26°
klarer Himmel
Luftfeuchtigkeit: 63 %
Druck: 1014 mb
Wind: 3 mph SSE
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 0%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:46 am
Sonnenuntergang: 9:21 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Tomorrow 10:00 pm
Wetter-Symbol
23° | 26°°C 0 mm 0% 11 mph 65 % 1015 mb 0 mm/h
Mi. Juli 02 10:00 pm
Wetter-Symbol
19° | 26°°C 0 mm 0% 12 mph 75 % 1024 mb 0 mm/h
Do. Juli 03 10:00 pm
Wetter-Symbol
14° | 26°°C 0 mm 0% 7 mph 53 % 1029 mb 0 mm/h
Fr. Juli 04 10:00 pm
Wetter-Symbol
16° | 28°°C 0 mm 0% 10 mph 47 % 1028 mb 0 mm/h
Sa. Juli 05 10:00 pm
Wetter-Symbol
16° | 21°°C 1 mm 100% 12 mph 90 % 1019 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
23° | 24°°C 0 mm 0% 3 mph 62 % 1014 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
21° | 22°°C 0 mm 0% 3 mph 65 % 1014 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
22° | 22°°C 0 mm 0% 5 mph 61 % 1014 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
28° | 28°°C 0 mm 0% 3 mph 44 % 1014 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
30° | 30°°C 0 mm 0% 6 mph 32 % 1014 mb 0 mm/h
Tomorrow 4:00 pm
Wetter-Symbol
34° | 34°°C 0 mm 0% 8 mph 26 % 1013 mb 0 mm/h
Tomorrow 7:00 pm
Wetter-Symbol
32° | 32°°C 0 mm 0% 11 mph 31 % 1013 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
25° | 25°°C 0 mm 0% 8 mph 46 % 1015 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€91,726.36
0.08%
Ethereum(ETH)
€2,141.69
2.99%
Fesseln(USDT)
€0.85
0.00%
XRP(XRP)
€1.95
4.59%
Solana(SOL)
€134.28
4.10%
USDC(USDC)
€0.85
0.00%
Dogecoin(DOGE)
€0.142338
1.58%
Shiba Inu(SHIB)
€0.000010
0.00%
Pepe(PEPE)
€0.000009
2.69%
Nach oben scrollen