{"id":9515,"date":"2024-11-27T10:58:40","date_gmt":"2024-11-27T17:58:40","guid":{"rendered":"https:\/\/jasonsblog.ddns.net\/?p=9515"},"modified":"2024-11-27T10:58:40","modified_gmt":"2024-11-27T17:58:40","slug":"russia-linked-hackers-exploited-firefox-and-windows-bugs-in-widespread-hacking-campaign","status":"publish","type":"post","link":"https:\/\/jasonsblog.ddns.net\/index.php\/2024\/11\/27\/russia-linked-hackers-exploited-firefox-and-windows-bugs-in-widespread-hacking-campaign\/","title":{"rendered":"Russia-Linked Hackers Exploited Firefox and Windows Bugs in \u2018Widespread\u2019 Hacking Campaign"},"content":{"rendered":"\n<p>Anything casting shade on the Russian government you have to treat with suspicion, but we do have a couple bugs that were fixed. The interesting part is look at the dates of the open source project fixing theirs verses when Microsoft fixed theirs. Consequently, it&#8217;s just not good to use a Windows machine unprotected online as Microsoft won&#8217;t fix bugs for a month unless it&#8217;s significantly dangerous to a lot of corporate customers. Consequently, I run GNU\/Linux virtual machines on my Windows 10 box (at least for a few more months). You run the VMs full screen and it&#8217;s like Linux is installed natively as the OS, and VMware Workstation now free for use has good 3D graphics support for Debian and older LTS versions of Ubuntu. <\/p>\n\n\n\n<p><a href=\"https:\/\/techcrunch.com\/2024\/11\/26\/russia-linked-hackers-exploited-firefox-and-windows-zero-day-bugs-in-widespread-hacking-campaign\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/techcrunch.com\/2024\/11\/26\/russia-linked-hackers-exploited-firefox-and-windows-zero-day-bugs-in-widespread-hacking-campaign\/<\/a><\/p>\n\n\n<div class=\"wp-block-ub-divider ub_divider ub-divider-orientation-horizontal\" id=\"ub_divider_c167ff75-add6-46d8-88d6-a4db52f4580f\"><div class=\"ub_divider_wrapper\" style=\"position: relative; margin-bottom: 2px; width: 100%; height: 2px; \" data-divider-alignment=\"center\"><div class=\"ub_divider_line\" style=\"border-top: 2px solid #ccc; margin-top: 2px; \"><\/div><\/div><\/div>\n\n\n<p>By Carly Page<\/p>\n\n\n\n<p id=\"speakable-summary\">Security researchers have uncovered two previously unknown <a href=\"https:\/\/techcrunch.com\/2024\/11\/05\/techcrunch-reference-guide-to-security-terminology\/#zero-day\">zero-day vulnerabilities<\/a> that are being actively exploited by RomCom, a Russian-linked hacking group, to target Firefox browser users and Windows device owners across Europe and North America.<\/p>\n\n\n\n<p>RomCom is a cybercrime group that is known to carry out cyberattacks and <a href=\"https:\/\/techcrunch.com\/2023\/05\/15\/cybercriminals-who-targeted-ukraine-are-actually-russian-government-hackers-researchers-say\/\">other digital intrusions for the Russian government<\/a>. The group \u2014 which was last month linked to a <a href=\"https:\/\/techcrunch.com\/2024\/11\/05\/techcrunch-reference-guide-to-security-terminology\/#zero-day\">ransomware attack targeting Japanese tech giant Casio<\/a> \u2014 is also known for its aggressive stance against organizations allied with Ukraine, which Russia invaded in 2014.<\/p>\n\n\n\n<p>Researchers with security firm ESET say they found evidence that RomCom combined use of the two zero-day bugs \u2014 described as such because the software makers had no time to roll out fixes before they were used to hack people \u2014 to create a \u201czero click\u201d exploit, which allows the hackers to remotely plant malware on a target\u2019s computer without any user interaction.<\/p>\n\n\n\n<p>\u201cThis level of sophistication demonstrates the threat actor\u2019s capability and intent to develop stealthy attack methods,\u201d ESET researchers Damien Schaeffer and Romain Dumont <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/romcom-exploits-firefox-and-windows-zero-days-in-the-wild\/\">said in a blog post on Monday<\/a>.<\/p>\n\n\n\n<p>RomCom\u2019s targets would have to visit a malicious website controlled by the hacking group in order to trigger the zero-click exploit. Once exploited, RomCom\u2019s eponymous backdoor would be installed on the victim\u2019s computer, allowing broad access to a victim\u2019s device.<\/p>\n\n\n\n<p>Schaeffer told TechCrunch that the number of potential victims from RomCom\u2019s \u201cwidespread\u201d hacking campaign ranged from a single victim per country to as many as 250 victims, with the majority of targets based in Europe and North America.<\/p>\n\n\n\n<p>Mozilla patched the vulnerability in Firefox on October 9, a day after ESET alerted the browser maker. The Tor Project, which <a href=\"https:\/\/techcrunch.com\/2024\/09\/30\/vpn-providers-do-not-protect-your-privacy-online-here-is-what-can\/\">develops the Tor Browser<\/a> based on Firefox\u2019s codebase, also patched the vulnerability; though Schaeffer told TechCrunch that ESET has seen no evidence that the Tor Browser was exploited during this hacking campaign.<\/p>\n\n\n\n<p>Microsoft patched the vulnerability affecting Windows on November 12. Security researchers with Google\u2019s Threat Analysis Group, which investigates government-backed cyberattacks and threats, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-49039\">reported the bug<\/a> to Microsoft, suggesting that the exploit may have been used in other government-backed hacking campaigns.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anything casting shade on the Russian government you have to treat with suspicion, but we do have a couple bugs that were fixed. The interesting part is look at the dates of the open source project fixing theirs verses when Microsoft fixed theirs. Consequently, it&#8217;s just not good to use a Windows machine unprotected online [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-9515","post","type-post","status-publish","format-standard","hentry","category-tech"],"blocksy_meta":[],"featured_image_src":null,"author_info":{"display_name":"Jason","author_link":"https:\/\/jasonsblog.ddns.net\/index.php\/author\/jturning\/"},"_links":{"self":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/9515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/comments?post=9515"}],"version-history":[{"count":1,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/9515\/revisions"}],"predecessor-version":[{"id":9516,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/9515\/revisions\/9516"}],"wp:attachment":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/media?parent=9515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/categories?post=9515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/tags?post=9515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}