securityonline.info
Open in
urlscan Pro
2a05:d014:776:a63e:ceb:15ad:bbb7:6a9d
Public Scan
Submitted URL: https://t.co/aS7VFhaQmx
Effective URL: https://securityonline.info/romcom-exploits-zero-days-in-firefox-cve-2024-9680-windows-cve-2024-49039-with-no-user-interaction/
Submission: On November 27 via api from IN — Scanned from DE
Effective URL: https://securityonline.info/romcom-exploits-zero-days-in-firefox-cve-2024-9680-windows-cve-2024-49039-with-no-user-interaction/
Submission: On November 27 via api from IN — Scanned from DE
Form analysis
2 forms found in the DOMhttps://securityonline.info/
<form role="search" class="search-form" action="https://securityonline.info/"><label><span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" name="s"></label>
<input type="submit" class="search-submit" value="Search">
</form>
https://securityonline.info/
<form role="search" class="search-form" action="https://securityonline.info/"><label><span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" name="s"></label>
<input type="submit" class="search-submit" value="Search">
</form>
Text Content
Skip to content Cybersecurity News * Search for: * Home * Cyber Security * Data Leak * Linux * Malware Attack * Open Source Tool * Technology * Vulnerability * Windows * Home * Cyber Security * Data Leak * Linux * Malware Attack * Open Source Tool * Technology * Vulnerability * Windows Search for: Cybersecurity News * Cyber Security / Vulnerability ROMCOM EXPLOITS ZERO-DAYS IN FIREFOX (CVE-2024-9680) & WINDOWS (CVE-2024-49039) WITH NO USER INTERACTION by do son · November 26, 2024 Exploit chain to compromise the victim | Image: ESET In a recent cybersecurity report, ESET researchers have unveiled a coordinated attack by the Russia-aligned threat actor RomCom, exploiting zero-day vulnerabilities in both Mozilla Firefox and Microsoft Windows. These vulnerabilities—previously unknown and exploited in the wild—enable attackers to execute malicious code without user interaction, demonstrating a high level of sophistication. ESET detailed how RomCom utilized a combination of two critical vulnerabilities: 1. CVE-2024-9680: A use-after-free bug in Firefox’s animation timeline feature with a CVSS score of 9.8. According to ESET, the flaw “allows vulnerable versions of Firefox, Thunderbird, and the Tor Browser to execute code in the restricted context of the browser.” Mozilla quickly addressed this vulnerability on October 9, 2024, within just 25 hours of receiving the report, a turnaround praised as “very impressive in comparison to industry standards.” 2. CVE-2024-49039: A privilege escalation flaw in Windows’ Task Scheduler service, rated 8.8 on the CVSS scale. This vulnerability allowed RomCom to bypass Firefox’s sandbox and escalate privileges. Exploitation of this flaw was confirmed by Microsoft, which released a patch on November 12, 2024. When combined, these vulnerabilities enabled zero-click exploitation, where victims only needed to visit a malicious webpage for the attack to succeed. As described by ESET, “an adversary can run arbitrary code – without any user interaction required – which in this case led to the installation of RomCom’s eponymous backdoor on the victim’s computer.” RomCom, also referred to as Storm-0978 or Tropical Scorpius, is known for its dual focus on cybercrime and espionage. In this campaign, the group used the exploits to deliver their RomCom backdoor, a tool capable of executing commands and downloading additional malicious payloads. ESET’s telemetry revealed widespread targeting, with victims primarily located in Europe and North America. The group employed fake domains mimicking legitimate websites to redirect victims to exploit-hosting servers. For example: * redircorrectiv[.]com mimicked the nonprofit newsroom Correctiv. * devolredir[.]com impersonated Devolutions, a provider of remote access solutions. This tactic allowed RomCom to blend malicious activity with legitimate web traffic, reducing the likelihood of detection. The Firefox exploit leveraged heap spraying and animation object manipulation to trigger the use-after-free vulnerability, ultimately enabling attackers to execute shellcode. In contrast, the Windows flaw exploited an undocumented RPC interface in the Task Scheduler service, allowing privilege escalation and sandbox escape. ESET noted that the malicious Windows library, named PocLowIL, used weak security descriptors that permitted unauthorized access to the RPC interface. The updated patch restricts access, effectively neutralizing the attack vector. ESET credited the swift collaboration with Mozilla and Microsoft in mitigating these vulnerabilities. Following ESET’s initial discovery on October 8, 2024, Mozilla released patches for Firefox, Thunderbird, and the Tor Browser within a day. Microsoft required additional time to address the sandbox escape issue, deploying a comprehensive fix through KB5046612 on November 12, 2024. The RomCom exploit campaign highlights the increasing sophistication of nation-state-aligned threat actors and the critical importance of rapid vulnerability disclosure and patching. As ESET emphasized: “Chaining together two zero-day vulnerabilities armed RomCom with an exploit that requires no user interaction. This level of sophistication shows the threat actor’s will and means to obtain or develop stealthy capabilities.” Organizations using affected versions of Firefox, Thunderbird, or Windows are urged to apply the latest updates immediately to safeguard against such advanced threats. For more information, read the full report by ESET. RELATED POSTS: * Firefox Zero-Day Vulnerability: Urgent Update Needed to Patch CVE-2024-9680 * RomCom Group’s Underground Ransomware Exploits Microsoft Zero-Day Flaw * New RomCom Variant “SnipBot” Unveiled: A Sophisticated Malware Targeting Enterprise Networks * UAT-5647 Unleashes RomCom Malware in Attacks on Ukraine and Poland Share Tags: backdoorCVE-2024-49039CVE-2024-9680RomComRomCom backdoor Follow: * * * * * SEARCH Visit Penetration Testing Tools & The Information Technology Daily Support Securityonline.info site. Thanks! * Vulnerability Researcher Details CVE-2024-38812 (CVSS 9.8): Critical RCE Flaw in VMware vCenter October 27, 2024 * Vulnerability PoC Exploit Releases for Critical Flaw in Synology TC500 and BC500 Camera to Get Shell October 31, 2024 * Vulnerability XStream Security Advisory: Denial-of-Service Vulnerability (CVE-2024-47072) November 11, 2024 * Vulnerability CVE-2024-11120 (CVSS 9.8): OS Command Injection Flaw in GeoVision Devices Actively Exploited, No Patch November 15, 2024 * Vulnerability Critical Vulnerability in D-Link EOL Routers Allows Remote Code Execution November 20, 2024 Reward BRILLIANTLY SAFE! securityonline.info CONTENT & LINKS Verified by Sur.ly 2022 WEBSITE 1. About SecurityOnline.info 2. Advertise on SecurityOnline.info 3. Contact * About Us * Contact Us * Disclaimer * Privacy Policy * DMCA NOTICE * Sponsors * Join Us * Member Login * Thank You * Membership Renewal Cybersecurity News © 2024. All Rights Reserved. * * * * * x ✕ DATENSCHUTZ & TRANSPARENZ securityonline.info und unsere Partner bitten um Ihre Zustimmung zur Nutzung Ihrer persönlichen Daten sowie zum Speichern und/oder Zugreifen auf Informationen auf Ihrem Gerät. Dazu gehört die Nutzung Ihrer persönlichen Daten für personalisierte Werbung und Inhalte, Werbe- und Inhaltsmessung, Publikumsforschung und die Entwicklung von Dienstleistungen. Ein Beispiel für die Verarbeitung von Daten könnte ein eindeutiger Identifikator sein, der in einem Cookie gespeichert wird. Ihre persönlichen Daten können von 911 Partnern gespeichert, abgerufen und geteilt werden oder speziell von dieser Seite genutzt werden. Sie können Ihre Einstellungen jederzeit ändern oder Ihre Zustimmung zurückziehen; der Link dazu befindet sich in unserer Datenschutzrichtlinie am Ende dieser Seite. Einige Anbieter können Ihre persönlichen Daten auf Grundlage eines berechtigten Interesses verarbeiten, gegen das Sie durch Verwalten Ihrer Einstellungen unten Einspruch erheben können. Einstellungen verwalten Nur notwendige Cookies Weiter mit den empfohlenen Cookies Anbieter-Liste | Datenschutzerklärung