Russian RomCom’s Browser Blunder: Zero-Day Exploits Hit Europe and North America

The Russian RomCom group exploited zero-day vulnerabilities in Firefox and Tor Browser to target users in Europe and North America. By chaining these vulnerabilities, the group accessed systems without user interaction, redirecting victims to fake sites. This sophisticated attack highlights the cybercrime prowess of RomCom.

Pro Dashboard

Hot Take:

When life gives you lemons, make lemonade. When life gives you zero-days, make RomCom malware! The Russian cybercriminals are back in the spotlight, proving once again that they have a flair for drama and a penchant for exploiting the newest flaws in our favorite web browsers. Who knew cybercrime could be this romantic?

Key Points:

  • The Russian RomCom group exploited Firefox and Tor Browser zero-day vulnerabilities to target users in Europe and North America.
  • Two vulnerabilities were used: CVE-2024-9680 (a use-after-free issue in Firefox) and CVE-2024-49039 (Windows Task Scheduler privilege escalation flaw).
  • The attack involved a compromise chain using fake websites to deliver malware without user interaction.
  • Mozilla released a fix for the vulnerabilities within 25 hours of disclosure by ESET.
  • RomCom’s attacks have been linked to targeting Ukrainian and Polish entities with updated malware variants.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?