×
ItalianoEnglish
Set as default language

Grandangolo Communications

  • Home
  • Company
  • Services
    • Public Relation
    • Digital PR
    • Marketing
    • Lead Generation
    • Events
  • Best Practice
  • Customer Press Room
  • Contacts
  • Languages
  • Home
  • Customer Press Room
  • Eset
  • ESET discovered zero-day and zero-click vulnerabilities in Mozilla and Windows exploited by pro-Russian APT group RomCom

Customer Press Room

ESET discovered zero-day and zero-click vulnerabilities in Mozilla and Windows exploited by pro-Russian APT group RomCom

by Grandangolo Communications / Friday, 29 November 2024 / Published in Eset

The two Zero-Day vulnerabilities, concatenated from each other, have provided Romom with an exploit that does not require any interaction from the user, if not navigation on a specificly created website. The victims were mostly located in Europe and North America

Researchers of ESET, a global European leader in the cybersecurity market, have identified a previously unknown vulnerability, CVE-2024-9680, in Mozilla products, exploited by the APT Romcom group, aligned with Russia. Further analyzes led to the discovery of another zero-day vulnerability in Windows, a privilege escalation bug now identified as CVE-2024-49039. In a successful attack, if the victim visits a web page containing the exploit, the attacker can perform arbitrary code without any user interaction (zero-click), leading to the installation of the Backdoor Romcom on the victim's device. The backdoor allows you to perform controls and download additional modules on the machine. The critical vulnerability linked to Mozilla, discovered by ESET Research on October 8, has a CommonArability Scoring System (CVSS) score of 9.8 on a scale from 0 to 10. In 2024, Romcom hit Ukrainian, in other European countries and the United States. According to ESET telemetry, between 10 October and 4 November 2024, the potential victims who visited the sites that housed the Exploit were mostly located in Europe and North America.

On October 8, 2024, ESET researchers discovered the CVE-2024-9680 vulnerability, a bug use-after-free in the animation functionality of the Firefox timeline. Mozilla corrected vulnerability on October 9, 2024. Further analyzes led to the discovery of another zero-day vulnerability in Windows: a privilege escalation bug identified as CVE-2024-49039, which allows the execution of code outside the Firefox sandbox. Microsoft released a patch for this second vulnerability on November 12, 2024.

The CVE-2024-9680 vulnerability allows the vulnerable versions of Firefox, Thunderbird and Tor Browser to perform code in the restricted context of the browser. In combination with the Windows vulnerability of 2024-49039, which has a CVSS score of 8.8, it is possible to perform arbitrary code in the context of the connected user. The joint use of the two zero-day vulnerabilities has allowed Romcom to develop an exploit that does not require any user interaction. This level of sophistication demonstrates both the intent and the group's skills in the development of unpaid tools. The successful attacks led to the installation of a Backdoor Romcom, in what appears as a large -scale campaign.

Romcom (also known as Storm-0978, Tropical Scorpius or UNC2596) is a pro-Russian group that leads both occasional campaigns against specific sectors and targeted espionage operations. The attention of the group focused on espionage and collection of information, parallel to more conventional computer crime activities. In 2024, ESET detected cyberspionage and computer crime operations conducted by Romcom against government bodies, the defense and energy sector in Ukraine, the pharmaceutical and insurance sector in the United States, the legal sector in Germany and government bodies in Europe.

"The compromise chain includes a false website that redirects the potential victim to the server that hosts the exploit. If the exploit is successful, a shellcode is performed that downloads and performs the Backdoor Romcom. We do not know how the link to the counterfeit website is distributed, but if the page is reached via a vulnerable browser, a payload is unloaded without any Interaction of the user, "says Damien Schaeffer, an ESET researcher who discovered both vulnerabilities. "We would like to thank the Mozilla team for the great reactivity and for the remarkable commitment to release a patch in less than a day," he adds. Each vulnerability has been corrected respectively by Mozilla and Microsoft.

It is at least the second time in which Romcom was caught taking advantage of a significant zero-day vulnerability, after the exploitation of CVE-2023-36884 through Microsoft Word in June 2023.

For a more detailed analysis of the uncovered vulnerabilities, consult the blog of ESET Research, RomCom exploits Firefox and Windows zero days in the wild, on WeliveSecurity.com. Follow ESET Research on Twitter (now known as X) For the latest news from ESET Research.

Tagged under: Eset

About Grandangolo Communications

What you can read next

ESET: Evasive Panda group from China spreads malware via updates of legitimate applications
MITER Engenuity ATT & CK® Evaluations tests ESET's endpoint detection & response capabilities
Mária Trnková nominated Chief Marketing Officer of ESET

Customer Press Room

  • VERTIV presents the Ai Factory of the future in Nvidia GTC Paris during Vivotech 2025

    VERTIV (NYSE: VRT), world leader in the infra ...
  • Vertiv expands the liquid cooling portfolio with scalable solutions for applications AI and HPC

    From today available in Emea, the expanded range ...
  • Sentinelone receives the Customer's Choice 2025 recognition in the Gartner® Peer Insight Report for XDR

    This recognition was attributed only to ...
  • ESET collaborates with international authorities to neutralize Danabot malware

    ESET monitor Danabot since 2018. The malware, off ...
  • Vertiv presents the latest innovations in the field of AI and Customer Insight at the DataCloud Global Congress 2025

    Technological applications of great impact, in ...

Archives

  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018

Categories

  • A10
  • abstract
  • Abstract
  • Acronis
  • Ally Consulting
  • Arrow
  • Arrow Electronics
  • Axiante
  • Babel
  • Computer Center
  • Cohesity
  • Italy Cloud Consortium
  • Consys
  • D-Link
  • Eset
  • G.B. Service
  • Habble
  • HiSolution
  • HYCU
  • Icos
  • Information Tecnology
  • Ivanti
  • Link11
  • MobileIron
  • Netalia
  • Nethive
  • Nexthink
  • Nuvis
  • Praim
  • QAD
  • Qualys
  • Red Hot Cyber
  • Riverbed
  • Saviynt
  • Sensormatic
  • SentinelOne
  • Talent Software
  • Vectra
  • Vectra AI
  • Vertiv

Office printing, digital PR, marketing, lead generation: all projects are born from our passion and expertise, with an inevitable touch of creativity and innovation.

COMPANY

Grandangolo Communications Srl
Via Sardegna 19
20146 Milano
Telephone +39 335 8283393
info@grandangolo.it

I SERVIZI

  • Home
  • Company
  • Services
  • Best Practice
  • Customer Press Room
  • Contacts
  • Languages

CONTACTS

  • Contacts
  • Cookie policy
  • Privacy policy

© 2019 GRANDANGOLO COMMUNICATIONS SRL | P.IVA IT 06394850967 | All rights reserveD.

Powered by Webpowerplus

TOP