Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Leveraging Microsoft Edge Internet Explorer Mode to Gain Access to Users’ Devices

Posted on October 13, 2025October 13, 2025 By CWS

The cybersecurity panorama witnessed a regarding improvement as menace actors found a novel assault vector concentrating on Microsoft Edge’s Web Explorer mode performance.

This refined marketing campaign emerged in August 2025, exploiting the inherent safety weaknesses of legacy browser expertise to compromise unsuspecting customers’ gadgets.

The assault represents a big evolution in menace actor ways, demonstrating their skill to weaponize seemingly benign compatibility options.

The assault methodology combines social engineering with zero-day exploits concentrating on Web Explorer’s Chakra JavaScript engine. Cybercriminals initially direct victims to fastidiously crafted spoofed web sites that seem legit, making a false sense of safety.

As soon as victims arrive at these malicious websites, attackers deploy a strategic flyout notification requesting customers to reload the web page in Web Explorer mode, successfully transitioning them from Edge’s safe Chromium-based surroundings to IE’s weak legacy framework.

This transition proves essential as Web Explorer lacks the sturdy safety structure and defense-in-depth mitigations current in trendy browsers.

The legacy surroundings exposes customers to dangers that up to date Chromium-based browsers are particularly engineered to forestall, creating a super exploitation alternative for malicious actors.

Microsoft Edge safety analysts recognized the menace after receiving credible intelligence about energetic exploitation campaigns.

The analysis workforce found that attackers had been systematically concentrating on the compatibility function designed to assist legacy enterprise functions, older safety digicam interfaces, and authorities portals that also depend on outdated applied sciences like ActiveX and Flash.

Chakra Engine Exploitation and Privilege Escalation

The assault’s technical sophistication lies in its multi-stage exploitation course of concentrating on the Chakra JavaScript engine.

After efficiently convincing victims to change to Web Explorer mode, attackers deploy unpatched zero-day exploits particularly crafted for IE’s JavaScript execution surroundings.

The Chakra engine, regardless of Microsoft’s earlier hardening efforts, stays weak to reminiscence corruption assaults that allow distant code execution.

Following profitable code execution throughout the browser context, menace actors implement a second exploit designed for privilege escalation.

This secondary payload permits attackers to interrupt out of the browser’s sandboxed surroundings, gaining elevated system privileges and full gadget management.

The twin-exploit strategy ensures complete system compromise, enabling malware set up, lateral motion inside company networks, and delicate information exfiltration.

Microsoft responded by proscribing IE mode entry, eradicating high-risk entry factors together with toolbar buttons and context menus whereas sustaining enterprise coverage assist for legit enterprise wants.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Access, Devices, Edge, Explorer, Gain, Hackers, Internet, Leveraging, Microsoft, Mode, Users

Post navigation

Previous Post: North Korean Hackers Attacking Developers with 338 Malicious npm Packages
Next Post: JPMorgan to Invest up to $10 Billion in US Companies with Crucial Ties to National Security

Related Posts

Threat Actors Exploitation Attempts Spikes as an Early Indicator of New Cyber Vulnerabilities Cyber Security News
North Korean Hackers Infiltrated 136 U.S. Companies to Generate $2.2 Million in Revenue Cyber Security News
Critical ModSecurity WAF Vulnerability Allows Denial of Service via Empty XML Tags Cyber Security News
WhatsApp 0-Day Vulnerability Exploited to Hack Mac and iOS Users Cyber Security News
251 Malicious IPs Attacking Cloud-Based Devices Leveraging 75 Exposure Points Cyber Security News
Allianz Life Insurance Data Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise
  • Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks
  • Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
  • One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM
  • Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise
  • Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks
  • Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
  • One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM
  • Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark