Security News > 2024 > November > RomCom hackers chained Firefox and Windows zero-days to deliver backdoor
Russia-aligned APT group RomCom was behind attacks that leveraged CVE-2024-9680, a remote code execution flaw in Firefox, and CVE-2024-49039, an elevation of privilege vulnerability in Windows Task Scheduler, as zero-days earlier this year. “Chaining together two zero-day vulnerabilities armed RomCom with an exploit that requires no user interaction,” ESET researchers said. The campaign leveraging the zero-click exploit CVE-2024-9680 allowed the attackers to execute code in the restricted context of the browser and CVE-2024-49039 allowed it … More → The post RomCom hackers chained Firefox and Windows zero-days to deliver backdoor appeared first on Help Net Security.
News URL
https://www.helpnetsecurity.com/2024/11/26/romcom-backdoor-cve-2024-9680-cve-2024-49039/
Related news
- Firefox and Windows zero-days exploited by Russian RomCom hackers (source)
- RomCom Exploits Zero-Day Firefox and Windows Flaws in Sophisticated Cyberattacks (source)
- Microsoft patches Windows zero-day exploited in attacks on Ukraine (source)
- How a Windows zero-day was exploited in the wild for months (CVE-2024-43451) (source)
- Chinese hackers exploit Fortinet VPN zero-day to steal credentials (source)
- Salt Typhoon hackers backdoor telcos with new GhostSpider malware (source)
- Hackers exploit ProjectSend flaw to backdoor exposed servers (source)
- New Windows Server 2012 zero-day gets free, unofficial patches (source)
- Mozilla really wants you to easily set Firefox as default Windows browser (source)
- Mozilla really wants you to set Firefox as default Windows browser (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-11-12 | CVE-2024-49039 | Unspecified vulnerability in Microsoft products Windows Task Scheduler Elevation of Privilege Vulnerability | 8.8 |
2024-10-09 | CVE-2024-9680 | Use After Free vulnerability in multiple products An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. | 9.8 |