This could allow hackers to create full administrator profile for themselves on the victims PC, edit data or install malicious programs.
The code could be delivered through the browser itself via a weblink or could be embedded in a PDF or HTML document and emailed, meaning you wouldn’t even have to be using Internet Explorer for you to fall victim to it’s compromised security.
The malware functioned by taking advantage of a script that handles memory processes (CVE-2019-1367) for which Microsoft have released a patch.
Even so, we advise removing Internet Explorer as Windows 10 also boasts its new integrated browser “Edge” which you are probably using by default. Even with this new browser, Microsoft include Internet Explorer in Windows 10 installs and so the program is on your PC ready for next time someone discovers an exploit.
To do this, search for “Turn Windows Features On or Off” in your Windows 10 search bar on the taskbar (bottom left).
Once opened, un-tick the box next to “Internet Explorer 11” you will need to restart your PC on completion.
Michael
Michael is responsible for brand awareness, GDPR compliance and client support both on-site and remote. He can also deliver one-to-one training for our clients on how to use a Mac, as well as troubleshooting any problems clients have with their Mac computers.
If you would like to talk to Michael about GPDR compliance or Mac-related issues, please let me know and I will ask him to contact you to answer your questions.
Kamila
General Manager
Octagon Technology Ltd