Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

At Starbase, SpaceX is doing its own firefighting.

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

FleetWorks raises $17 million to match truck drivers with freight faster

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Microsoft locks down IE mode after hackers turn legacy feature into backdoor
Identity

Microsoft locks down IE mode after hackers turn legacy feature into backdoor

userBy userOctober 13, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 13, 2025Ravi LakshmananBrowser security / Windows security

Microsoft announced in August 2025 that it has revamped the Internet Explorer (IE) mode in its Edge browser after receiving “credible reports” that unknown attackers were exploiting backward compatibility features to gain unauthorized access to users’ devices.

“Threat actors utilized basic social engineering techniques alongside unpatched (zero-day) exploits of Internet Explorer’s JavaScript engine (Chakra) to gain access to victims’ devices,” the Microsoft Browser Vulnerability Research Team said in a report released last week.

In an attack chain documented by Windows manufacturers, attackers have been found to trick unsuspecting users into visiting a seemingly legitimate website and then use an on-page flyout to instruct them to reload the page in IE mode.

DFIR retainer service

Once the page reloaded, the attackers were said to be armed with an unspecified exploit in the Chakra engine to remotely execute code. The infection sequence culminates with the attacker using a second exploit to escalate privileges from the browser and take full control of the victim’s device.

This activity is particularly alarming because by using Internet Explorer to launch in a less secure state, it subverts modern defenses built into Chromium and Microsoft Edge, effectively allowing threat actors to bypass the browser’s limitations and perform various post-exploitation steps such as malware deployment, lateral movement, and data leakage.

Microsoft did not provide details about the nature of the vulnerability, the identity of the attackers behind the attack, or the scale of the effort.

However, in response to evidence of active abuse and the security risks posed by this feature, the company said it has taken steps to remove dedicated toolbar buttons, context menus, and hamburger menu items.

Users who wish to enable IE mode must do so explicitly on a case-by-case basis through their Edge browser settings.

[設定]>[デフォルトのブラウザ]Move to.[Internet Explorer モードでのサイトのリロードを許可する]Find your options and[許可]Set to . After you enable this setting, add specific sites that require IE compatibility to the Internet Explorer mode page list. Reload the site.

CIS build kit

Windows manufacturers have noted that these restrictions on IE mode booting are necessary to balance the need for security and legacy support.

“This approach makes decisions to load web content using legacy technologies more intentional,” Microsoft said. “The additional steps required to add a site to the site list are a significant barrier for even the most determined attacker to overcome.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleScientists have ‘awakened’ ancient microorganisms from permafrost and found that they soon started producing large amounts of CO2
Next Article Europe accelerates AI ambitions with six new AI factories
user
  • Website

Related Posts

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

October 14, 2025

How Threat Hunting Builds Readiness

October 14, 2025

A single 8-byte write shatters AMD’s SEV-SNP Confidential Computing security

October 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

At Starbase, SpaceX is doing its own firefighting.

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

FleetWorks raises $17 million to match truck drivers with freight faster

Aquawise unveils AI-powered water quality technology at TechCrunch Disrupt 2025

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Meet Your Digital Double: FySelf Unveils TwinH, the Future of Personalized Online Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.