{"vulnerability": "cve-2016-3353", "sightings": [{"uuid": "b64111c6-366b-4f64-b012-fb932b43deaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-3353", "type": "exploited", "source": "https://t.me/information_security_channel/14214", "content": "Email campaign using .url extensions to abuse Internet Explorer vulnerabilities (CVE-2016-3353)\nhttp://blogs.quickheal.com/email-campaign-using-url-extensions-abuse-internet-explorer-vulnerabilities-cve-2016-3353/\n\nIn the wild, malspam campaigns are a major medium to spread malware. Previously, we have written about such campaigns using MS Office files with malicious macro and using vulnerabilities. Recently, we observed a spam campaign that uses .url files as a first-stage downloader to spread malware and bypass security features\u2026.", "creation_timestamp": "2018-03-14T10:19:20.000000Z"}]}