HomeCII/OTRomantic Comedy APT Mounts Zero-Day, Zero-Click Browser Escapes in Firefox, Tor

Romantic Comedy APT Mounts Zero-Day, Zero-Click Browser Escapes in Firefox, Tor

Published on

spot_img

In October, a critical security threat emerged when Russian hackers managed to exploit two zero-day vulnerabilities in Firefox and Windows, allowing them the potential to launch arbitrary code against anyone in the world who used the affected software. The malicious files were first discovered on a server managed by the Russian advanced persistent threat group RomCom (also known as Storm-0978, Tropical Scorpius, UNC2596) on Oct. 8, only five days after they had been uploaded on Oct. 3.

The vulnerabilities, CVE-2024-9680 and CVE-2024-49039, posed serious risks to users of Mozilla’s Firefox browser, its email client “Thunderbird,” and the Tor browser, which is based on Firefox’s Extended Support Release (ESR) browser. The exploit quickly spread the RomCom backdoor to unsuspecting visitors of infected websites, without the need for any user interaction. Victims would download the backdoor from RomCom-controlled servers and then be redirected to the intended website they were visiting.

These crafted websites targeted high-profile organizations such as ConnectWise, Devolutions IT services, and Correctiv, a nonprofit investigative journalism newsroom in Germany, reflecting RomCom’s shift towards politically motivated espionage in recent times. RomCom’s cyber-espionage activities have extended to sectors such as insurance, pharmaceuticals in the US, as well as defense, energy, and government in Ukraine.

The impact of these vulnerabilities remains unknown, although the majority of targets were concentrated in North America and Europe, with specific focus on the Czech Republic, France, Germany, Poland, Spain, Italy, and the US. Surprisingly, victims tracked by ESET were not compromised via the Tor browser due to its distinct settings compared to Firefox. RomCom primarily targeted corporations, which are less likely to use Tor.

Fortunately, both vulnerabilities have since been patched, with CVE-2024-9680 addressed on Oct. 9, just 25 hours after being notified to Mozilla, and CVE-2024-49039 fixed on Nov. 12. Despite this remediation effort, the responsibility lies with organizations to ensure prompt patch management to protect against such threats in the future.

Overall, the exploitations by Russian hackers via RomCom underscore the ever-present cybersecurity risks faced by users worldwide, emphasizing the importance of swift action and vigilance in safeguarding against potential threats in the digital landscape.

Source link

Latest articles

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...

Why Business Impact Should Lead the Security Conversation

 Security teams face growing demands with more tools, more data, and higher expectations...

More like this

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...