This malicious tool still successfully exploits vulnerabilities in Internet Explorer

This malicious tool still successfully exploits vulnerabilities in Internet Explorer

The well-known exploit-as-a-service RIG Exploit Kit, aimed at users of the ancient and fragile Internet Explorer Internet browser, continues to work, experts have warned.

According to a report (opens in a new tab) by security research firm Prodaft, the kit's installations attempt around two thousand intrusions per day and are successful thirty percent of the time, allowing it to spread information thieves. information and attack other forms of malware for users in more than two hundred and seven countries. countries.

Despite the warning against the rise of cybercrime-as-a-service in the XNUMX Microsoft Digital Defense report, and the fact that RIG is also known to distribute ransomware, millions of users (mostly businesses) simply won't stop using Windows Explorer, supposedly with no regard for data privacy.

Update your browser, please God

Internet Explorer has been new old since around XNUMX, when the now Chromium-based Edge went into development, and has been completely deprecated since August XNUMX.

And in February XNUMX, Microsoft announced that it was finally preparing to scrap it entirely, a shame as it is these days, and make you use Edge anyway (although you can still do a lot better).

We continue to write about this and continue to receive emails from increasingly violent criminals swearing at us why we bother giving security posture advice to companies. (Hugs and kisses to our readers, even if they escape from a corporation. xox)

But you know what? We're going to do it again: Get new Windows XNUMX laptops and enjoy every UI advancement that's come in the last twenty-eight years, gone blind.

And then maybe you shouldn't keep a straight face in front of IT when threat actors known only as the "Bean Meme Gang" steal the private medical records of a million people, and we could write about something else.

Via BleepingComputer (opens in a new tab)