{"id":986,"date":"2024-11-27T18:35:45","date_gmt":"2024-11-27T18:35:45","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=986"},"modified":"2024-11-27T18:35:45","modified_gmt":"2024-11-27T18:35:45","slug":"russian-apt-romcom-combines-firefox-and-windows-zero-day-flaws-in-drive-by-exploit","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=986","title":{"rendered":"Russian APT RomCom combines Firefox and Windows zero-day flaws in drive-by exploit"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>A Russia-aligned group that engages in both cybercrime and cyberespionage operations used a zero-click exploit chain last month that combined previously unknown and unpatched vulnerabilities in Firefox and Windows.<\/p>\n<p>The campaign, whose goal was to deploy the group\u2019s RomCom backdoor on computers, targeted users from Europe and North America. The APT group, also known as Storm-0978, Tropical Scorpius, and UNC2596 uses both opportunistic attacks against various business sectors, as well as targeted intelligence collection operations, especially against government entities from Ukraine and countries that support Ukraine.<\/p>\n<p>This year, researchers from antivirus vendor ESET detected RomCom campaigns against the government, defense, and energy sectors in Ukraine, the pharmaceutical and insurance sectors in the US, the legal sector in Germany, and various European government organizations. The latest campaign in October that used the zero-day exploit seemed to have a worldwide distribution, with a particular focus on the EU and the US.<\/p>\n<p>\u201cThis is at least the second time that RomCom has been caught exploiting a significant zero-day vulnerability in the wild, after the abuse of CVE-2023-36884 via Microsoft Word in June 2023,\u201d the ESET researchers said in <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/romcom-exploits-firefox-and-windows-zero-days-in-the-wild\/\">a report<\/a> this week.<\/p>\n<h2 class=\"wp-block-heading\">Exploit uses a Firefox remote code execution flaw<\/h2>\n<p>The latest attacks were launched via rogue website redirects against users of Firefox or Tor Browser (which is based on Firefox) on Windows. While it\u2019s not clear how users were directed to the attacker-controlled URLs, the domains serving the exploit included the prefix <strong>redir<\/strong> or suffix <strong>red<\/strong> attached to a legitimate domain that the user was eventually redirected to.<\/p>\n<p>Some examples include correctiv.org, a German non-profit news site; devolutions.net, a remote access and password management solutions provider; and connectwise.com, an MSP and IT management software provider.<\/p>\n<p>When visiting the redirect page, a malicious JavaScript script is executed that exploits a use-after-free memory vulnerability in the Firefox animation timelines feature. The flaw, now tracked as CVE-2024-9680, was patched on Oct. 9, one day after the ESET researchers reported it to Mozilla. The vulnerability is rated critical with a score of 9.8 and results in code execution inside the Firefox content process, namely a malicious DLL library in this case.<\/p>\n<p>\u201cMozilla patched the vulnerability in Firefox 131.0.2, Firefox ESR 128.3.1, and Firefox ESR 115.16.1 on October 9, 2024,\u201d the ESET researchers said. \u201cEssentially, the pointers to the animation objects handled by the timeline are now implemented through reference-counting pointers (RefPtr), as suggested by the diff, which prevents the animations from being freed, since AnimationTimeline::Tick will still hold a reference to them.\u201d<\/p>\n<h2 class=\"wp-block-heading\">A privilege escalation flaw in Windows Task Scheduler<\/h2>\n<p>The Firefox content process is sandboxed, having an untrusted privilege level, which means that the attackers couldn\u2019t execute code on the underlying operating system with just the Firefox vulnerability alone.<\/p>\n<p>To escape the process sandbox, the RomCom attack exploited another previously unknown vulnerability in the Windows Task Scheduler that was patched on Nov. 12 and is now tracked as CVE-2024-49039.<\/p>\n<p>\u201cEssentially, the library makes use of an undocumented RPC endpoint, which should not have been callable from an untrusted process level, to launch a hidden PowerShell process that downloads a second stage from a C&amp;C server,\u201d the ESET researchers said.<\/p>\n<p>In particular the RPC (Remote Procedure Call) endpoint is used to create a scheduled task named firefox.exe that is configured to launch conhost.exe in headless mode in order to hide the child process window. This results in privilege escalation to medium integrity allowing the sandbox escape.<\/p>\n<p>The second stage payload downloaded by the PowerShell script is saved in the %PUBLIC% folder as public.exe and is executed twice, with a 10-second delay. The ESET report includes a list of indicators of compromise, such as file hashes, IP addresses and rogue domain names, associated with this campaign and zero-click exploit.<\/p>\n<p>\u201cThis level of sophistication shows the threat actor\u2019s will and means to obtain or develop stealthy capabilities,\u201d the researchers said. \u201cESET shared detailed findings with Mozilla, following our coordinated vulnerability disclosure process shortly after discovery. Mozilla released a blog post about how they reacted to the disclosure and were able to release a fix within 25 hours, which is very impressive in comparison to industry standards.\u201d<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>A Russia-aligned group that engages in both cybercrime and cyberespionage operations used a zero-click exploit chain last month that combined previously unknown and unpatched vulnerabilities in Firefox and Windows. The campaign, whose goal was to deploy the group\u2019s RomCom backdoor on computers, targeted users from Europe and North America. The APT group, also known as [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":987,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-986","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/986"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=986"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/986\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/987"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}