Void Banshee’s Zero-Day Assault on Windows Users via Internet Explorer

Threat Level – Red | Attack Report
Download PDF

Threat actors are exploiting the CVE-2024-38112 vulnerability by abusing the mhtml protocol handler to lure Windows users into remote code execution. They use Windows Internet Shortcut files (.url) to trigger the retired Internet Explorer (IE) to visit attacker-controlled URLs. The APT group Void Banshee has been found capitalizing on this flaw, deploying the Atlantida stealer for information theft and financial gains.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox

Cyber Horizons 2025

What Last Year’s Attacks Reveal About Today’s Risks

Watch the Webinar on-demand and get a FREE copy of our Cyber Horizons 2025 report.

Our Speakers
Speaker 1

Prateek Bhajanka Global Field CISO & Former Gartner Analyst Hive Pro Inc.

Speaker 2

Ankit Mani Manager Threat Intel HiveForce Labs

Speaker 3

Sreevani Tonipe Senior Threat Researcher HiveForce Labs