RomCom’s Comedic Cyber Flop: Russian Hackers’ Quick 30-Minute Fail!
RomCom threat actors have a new partner in crime, SocGholish, to add some drama to their cyber exploits. Using fake browser updates, they aim to trick users into downloading malware. However, their Hollywood-worthy plot was thwarted in under 30 minutes, proving that even cybervillains can have a bad day.

Hot Take:
The cybercrime world is like a never-ending soap opera with endless plot twists. Just when you thought you were safe, here comes RomCom and SocGholish, ready to sweep you off your feet with a malware love story that nobody asked for. If you’re a civil engineer in the U.S., you might want to double-check those browser updates before clicking. Who knew a simple JavaScript could lead to such high-stakes drama? Cue the dramatic music!
Key Points:
- RomCom malware targets a U.S. civil engineering firm via the SocGholish JavaScript loader.
- Attack linked to Russia’s GRU, specifically Unit 29155, targeting entities with past Ukraine ties.
- SocGholish serves as an initial access broker for various threat actors, including Evil Corp and LockBit.
- Fake browser update alerts are used to trick users into downloading malicious JavaScript.
- RomCom utilizes spear-phishing and exploits to deploy a remote access trojan (RAT) on victim machines.
Already a member? Log in here
