The zero-day exploit used to leverage CVE-2024-38112, a recently patched Windows MSHTML vulnerability, was wielded by an APT group dubbed Void Banshee to deliver malware to targets in North America, Europe, and Southeast Asia, threat hunters with Trend Micro’s Zero Day Initiative have shared. How Void Banshee used CVE-2024-38112 As previously explained by Check Point researcher Haifei Li, the attackers used files that were specially crafted to exploit the vulnerability but were made to look … More

The post Void Banshee APT exploited “lingering Windows relic” in zero-day attacks appeared first on Help Net Security.

By

Leave a Reply

Your email address will not be published. Required fields are marked *