
The Russia-aligned risk actor referred to as RomCom has been connected to the zero-day exploitation of 2 safety flaws, one in Mozilla Firefox and the opposite in Microsoft Home windows, as a part of assaults designed to ship the eponymous backdoor on sufferer programs.
“In a a hit assault, if a sufferer browses a internet web page containing the exploit, an adversary can run arbitrary code – with none person interplay required (0 click on) – which on this case ended in the set up of RomCom’s backdoor at the sufferer’s pc,” ESET stated in a document shared with The Hacker Information.
The vulnerabilities in query are indexed beneath –
- CVE-2024-9680 (CVSS rating: 9.8) – A use-after-free vulnerability in Firefox’s Animation part (Patched by means of Mozilla in October 2024)
- CVE-2024-49039 (CVSS rating: 8.8) – A privilege escalation vulnerability in Home windows Activity Scheduler (Patched by means of Microsoft in November 2024)

RomCom, often referred to as Hurricane-0978, Tropical Scorpius, UAC-0180, UNC2596, and Void Rabisu, has a monitor report of engaging in each cybercrime and espionage operations since no less than 2022.
Those assaults are notable for the deployment of RomCom RAT, an actively maintained malware that is in a position to executing instructions and downloading further modules to the sufferer’s system.
The assault chain came upon by means of Slovak cybersecurity corporate concerned using a faux site (economistjournal[.]cloud) that is chargeable for redirecting potential sufferers to a server (redjournal[.]cloud) internet hosting the malicious payload that, in flip, strings in combination each the issues to succeed in code execution and drop the RomCom RAT.

It is these days no longer recognized how hyperlinks to the faux site are dispensed, but it surely has been discovered that the exploit is brought about must the web site be visited from a prone model of the Firefox browser.
“If a sufferer the use of a prone browser visits a internet web page serving this exploit, the vulnerability is brought about and shellcode is carried out in a content material procedure,” ESET defined.
“The shellcode consists of 2 portions: the primary retrieves the second one from reminiscence and marks the containing pages as executable, whilst the second one implements a PE loader in accordance with the open-source venture Shellcode Reflective DLL Injection (RDI).”
The result’s a sandbox break out for Firefox that in the end results in the obtain and execution of RomCom RAT at the compromised gadget. That is achieved by way of an embedded library (“PocLowIL”) that is designed to wreck out of the browser’s sandboxed content material procedure by means of weaponizing the Home windows Activity Scheduler flaw to procure increased privileges.
Telemetry information accumulated by means of ESET displays {that a} majority of the sufferers who visited the exploit-hosting web site have been positioned in Europe and North The us.

The truth that CVE-2024-49039 used to be independently additionally came upon and reported to Microsoft by means of Google’s Danger Research Workforce (TAG) means that multiple risk actor will have been exploiting it as a zero-day.
Additionally it is value noting that that is the second one time that RomCom has been stuck exploiting a zero-day vulnerability within the wild, after the abuse of CVE-2023-36884 by way of Microsoft Phrase in June 2023.
“Chaining in combination two zero-day vulnerabilities armed RomCom with an exploit that calls for no person interplay,” ESET stated. “This stage of class displays the risk actor’s will and approach to procure or increase stealthy functions.”