Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

From Svedka to Anthropic, brands are boldly leveraging AI in their Super Bowl ads

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

India changes deep tech startup rules

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Microsoft locks down IE mode after hackers turn legacy feature into backdoor
Identity

Microsoft locks down IE mode after hackers turn legacy feature into backdoor

userBy userOctober 13, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 13, 2025Ravi LakshmananBrowser security / Windows security

Microsoft announced in August 2025 that it has revamped the Internet Explorer (IE) mode in its Edge browser after receiving “credible reports” that unknown attackers were exploiting backward compatibility features to gain unauthorized access to users’ devices.

“Threat actors utilized basic social engineering techniques alongside unpatched (zero-day) exploits of Internet Explorer’s JavaScript engine (Chakra) to gain access to victims’ devices,” the Microsoft Browser Vulnerability Research Team said in a report released last week.

In an attack chain documented by Windows manufacturers, attackers have been found to trick unsuspecting users into visiting a seemingly legitimate website and then use an on-page flyout to instruct them to reload the page in IE mode.

DFIR retainer service

Once the page reloaded, the attackers were said to be armed with an unspecified exploit in the Chakra engine to remotely execute code. The infection sequence culminates with the attacker using a second exploit to escalate privileges from the browser and take full control of the victim’s device.

This activity is particularly alarming because by using Internet Explorer to launch in a less secure state, it subverts modern defenses built into Chromium and Microsoft Edge, effectively allowing threat actors to bypass the browser’s limitations and perform various post-exploitation steps such as malware deployment, lateral movement, and data leakage.

Microsoft did not provide details about the nature of the vulnerability, the identity of the attackers behind the attack, or the scale of the effort.

However, in response to evidence of active abuse and the security risks posed by this feature, the company said it has taken steps to remove dedicated toolbar buttons, context menus, and hamburger menu items.

Users who wish to enable IE mode must do so explicitly on a case-by-case basis through their Edge browser settings.

[設定]>[デフォルトのブラウザ]Move to.[Internet Explorer モードでのサイトのリロードを許可する]Find your options and[許可]Set to . After you enable this setting, add specific sites that require IE compatibility to the Internet Explorer mode page list. Reload the site.

CIS build kit

Windows manufacturers have noted that these restrictions on IE mode booting are necessary to balance the need for security and legacy support.

“This approach makes decisions to load web content using legacy technologies more intentional,” Microsoft said. “The additional steps required to add a site to the site list are a significant barrier for even the most determined attacker to overcome.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleScientists have ‘awakened’ ancient microorganisms from permafrost and found that they soon started producing large amounts of CO2
Next Article Europe accelerates AI ambitions with six new AI factories
user
  • Website

Related Posts

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

February 8, 2026

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

February 7, 2026

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

From Svedka to Anthropic, brands are boldly leveraging AI in their Super Bowl ads

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

India changes deep tech startup rules

Kids ‘picked last in gym class’ prepare for Super Bowl

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.