Russian APT Chained Firefox and Windows Zero-Days Against US and European Targets

Russian APT Chained Firefox and Windows Zero-Days Against US and European Targets

November 27, 2024 at 04:22AM

A Russia-linked hacking group, RomCom, has exploited two recent Firefox and Windows zero-day vulnerabilities to install a backdoor on victims’ machines. Mostly targeting entities in North America and Europe, the group employs sophisticated methods requiring no user interaction, highlighting their capacity for stealthy cyber operations.

### Meeting Takeaways:

1. **APT Activity**: A Russia-linked Advanced Persistent Threat (APT) actor, associated with multiple aliases (RomCom, Storm-0978, Tropical Scorpius, UNC2596), has been observed exploiting two recent zero-day vulnerabilities to deploy a backdoor on victims’ machines.

2. **Exploited Vulnerabilities**:
– **CVE-2024-9680** (Firefox, Thunderbird, Tor) – A critical-severity use-after-free vulnerability allowing arbitrary code execution without user interaction, exploited in the wild and patched on October 9.
– **CVE-2024-49039** (Windows Task Scheduler) – A high-severity bug enabling privilege escalation and code execution from a low-privilege AppContainer, which Microsoft patched on November 12.

3. **Attack Mechanism**:
– Victims are redirected to a malicious website hosting exploits which run shellcode to deliver RomCom’s backdoor.
– The attack bypasses security measures by loading a malicious library that escapes Firefox’s sandbox restrictions.

4. **Target Demographics**:
– The majority of targeted victims are based in North America (primarily the U.S.) and Europe, particularly between October 10 and November 4, 2024.

5. **Historical Context**:
– RomCom has links to previous cybercrime and espionage activities, including targeting U.S. and European government, defense, and energy sectors, as well as private pharmaceutical, legal, and insurance entities.

6. **Security Response**:
– ESET reported the vulnerabilities to Mozilla and Microsoft, with confirmations following. Mozilla acknowledged the zero-day on October 14.

7. **Implications**:
– The sophistication of chaining two zero-day vulnerabilities for an exploit indicates a high level of capability for stealth operations, posing significant risks to targeted sectors.

### Action Items:
– Continued monitoring and reporting of any further suspicious activities related to RomCom.
– Enhanced security measures and updates for affected software (Firefox and Windows) within the organization.
– Consider further evaluation of exposure to sectors targeted by RomCom for potential risk mitigation.

Full Article