Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Leveraging Microsoft Edge Internet Explorer Mode to Gain Access to Users’ Devices

Posted on October 13, 2025October 13, 2025 By CWS

The cybersecurity panorama witnessed a regarding improvement as menace actors found a novel assault vector concentrating on Microsoft Edge’s Web Explorer mode performance.

This refined marketing campaign emerged in August 2025, exploiting the inherent safety weaknesses of legacy browser expertise to compromise unsuspecting customers’ gadgets.

The assault represents a big evolution in menace actor ways, demonstrating their skill to weaponize seemingly benign compatibility options.

The assault methodology combines social engineering with zero-day exploits concentrating on Web Explorer’s Chakra JavaScript engine. Cybercriminals initially direct victims to fastidiously crafted spoofed web sites that seem legit, making a false sense of safety.

As soon as victims arrive at these malicious websites, attackers deploy a strategic flyout notification requesting customers to reload the web page in Web Explorer mode, successfully transitioning them from Edge’s safe Chromium-based surroundings to IE’s weak legacy framework.

This transition proves essential as Web Explorer lacks the sturdy safety structure and defense-in-depth mitigations current in trendy browsers.

The legacy surroundings exposes customers to dangers that up to date Chromium-based browsers are particularly engineered to forestall, creating a super exploitation alternative for malicious actors.

Microsoft Edge safety analysts recognized the menace after receiving credible intelligence about energetic exploitation campaigns.

The analysis workforce found that attackers had been systematically concentrating on the compatibility function designed to assist legacy enterprise functions, older safety digicam interfaces, and authorities portals that also depend on outdated applied sciences like ActiveX and Flash.

Chakra Engine Exploitation and Privilege Escalation

The assault’s technical sophistication lies in its multi-stage exploitation course of concentrating on the Chakra JavaScript engine.

After efficiently convincing victims to change to Web Explorer mode, attackers deploy unpatched zero-day exploits particularly crafted for IE’s JavaScript execution surroundings.

The Chakra engine, regardless of Microsoft’s earlier hardening efforts, stays weak to reminiscence corruption assaults that allow distant code execution.

Following profitable code execution throughout the browser context, menace actors implement a second exploit designed for privilege escalation.

This secondary payload permits attackers to interrupt out of the browser’s sandboxed surroundings, gaining elevated system privileges and full gadget management.

The twin-exploit strategy ensures complete system compromise, enabling malware set up, lateral motion inside company networks, and delicate information exfiltration.

Microsoft responded by proscribing IE mode entry, eradicating high-risk entry factors together with toolbar buttons and context menus whereas sustaining enterprise coverage assist for legit enterprise wants.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Access, Devices, Edge, Explorer, Gain, Hackers, Internet, Leveraging, Microsoft, Mode, Users

Post navigation

Previous Post: North Korean Hackers Attacking Developers with 338 Malicious npm Packages
Next Post: JPMorgan to Invest up to $10 Billion in US Companies with Crucial Ties to National Security

Related Posts

Critical Trend Micro Apex One Management RCE Vulnerability Actively Exploited in the wild Cyber Security News
ScriptCase Vulnerabilities Let Attackers Execute Remote Code and Gain Server Access Cyber Security News
Developers Beware of npm Phishing Email That Steal Your Login Credentials Cyber Security News
Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection Cyber Security News
Amp’ed RF BT-AP 111 Bluetooth Access Point Vulnerability Let Attackers Gain Full Admin Access Cyber Security News
Timeliner – Windows Forensic Tool for DFIR Investigators Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • JPMorgan to Invest up to $10 Billion in US Companies with Crucial Ties to National Security
  • Hackers Leveraging Microsoft Edge Internet Explorer Mode to Gain Access to Users’ Devices
  • North Korean Hackers Attacking Developers with 338 Malicious npm Packages
  • New WhatsApp Worm Attacks Users with Banking Malware to Users Login Credentials
  • Fighting the Cyber Forever War: Born Defense Blends Investment Strategy with Just War Principles

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • JPMorgan to Invest up to $10 Billion in US Companies with Crucial Ties to National Security
  • Hackers Leveraging Microsoft Edge Internet Explorer Mode to Gain Access to Users’ Devices
  • North Korean Hackers Attacking Developers with 338 Malicious npm Packages
  • New WhatsApp Worm Attacks Users with Banking Malware to Users Login Credentials
  • Fighting the Cyber Forever War: Born Defense Blends Investment Strategy with Just War Principles

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News