• Gone Phishing
  • Posts
  • ๐Ÿšจ RomCom Exploits Firefox & Windows Zero-Days to Spread Malware ๐Ÿ‘พ

๐Ÿšจ RomCom Exploits Firefox & Windows Zero-Days to Spread Malware ๐Ÿ‘พ

In partnership with

Gone Phishing Banner

Welcome to Gone Phishing, your daily cybersecurity newsletter thatโ€™s as popular with hackers as Keir Starmer is with the British public ๐Ÿ™ˆ๐Ÿ™ˆ๐Ÿ™ˆ 

Patch of the Week! ๐Ÿฉน

First thingโ€™s first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโ€™s itโ€ฆ ๐Ÿ˜ณ 

Congrats to WordPress, the cybercriminals are no matchโ€ฆ for your patch! ๐Ÿฉน

Check out this freshly hatched patch ๐Ÿฃ

Stop the WordPresses ๐Ÿ“ฐ 

๐Ÿšจ WordPress Security Alert! โš ๏ธ 

Two critical vulnerabilities (CVSS 9.8) in the Spam protection, Anti-Spam, and FireWall plugin by CleanTalk could let attackers install malicious plugins and even achieve remote code execution ๐Ÿ’ฅ.

๐Ÿ”“ Vulnerabilities:

  • CVE-2024-10542: Authorization bypass via DNS spoofing ๐ŸŒ

  • CVE-2024-10781: API key bypass, allowing unauthorized plugin installations ๐Ÿ”‘

These flaws affect versions up to 6.44. The plugin is installed on 200,000+ WordPress sites ๐Ÿ“Š.

๐Ÿ’ก Threats:

Install/activate vulnerable plugins

Execute malicious code ๐Ÿ

Redirect visitors, steal admin credentials, and inject malware ๐Ÿ›ก๏ธ

๐Ÿ”ฅ Action Required:

Update to version 6.45 or later immediately to secure your site and block potential attacks! ๐Ÿš€

Stay safe! ๐ŸŒโœจ

Now, on to this weekโ€™s hottest cybersecurity news stories: 

  • ๐Ÿ’” RomCom breaks the hearts of Firefox & Windows users ๐Ÿ‘พ

  • ๐ŸŒ‰ GLASSBRIDGE is a pro-China fake news network, says Google ๐ŸŒ

  • ๐Ÿฆนโ€โ™‚๏ธ Introducing HATVIBE & CHERRYSPY, the latest in Russian hackery ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป

Hugh Grants them these names? ๐Ÿฟ๐ŸŽฅ๐Ÿ’˜๐Ÿ‘€๐Ÿ˜‰

๐Ÿšจ RomCom Exploits Firefox & Windows Zero-Days to Spread Malware ๐Ÿ‘พ

The Russia-linked hacker group RomCom has been caught exploiting two critical zero-day vulnerabilities to sneak its RomCom RAT backdoor into victims' systems without any clicks or interaction.

๐Ÿ’ฅ The Vulnerabilities:

  • CVE-2024-9680 (๐Ÿ”ฅ 9.8 CVSS) โ€“ A Firefox bug that lets hackers execute code remotely.

  • CVE-2024-49039 (โšก 8.8 CVSS) โ€“ A flaw in Windows Task Scheduler that grants admin privileges.

๐Ÿ•ต๏ธ How It Works:

Hackers set up a fake website, economistjournal[.]cloud. Victims using outdated Firefox versions are automatically hit by the exploit, leading to a chain reaction:

๐Ÿ’ฃ Firefox sandbox escape โžก๏ธ Windows privilege escalation โžก๏ธ RomCom RAT installed.

๐ŸŒ Whoโ€™s Affected? 

Mostly users in Europe and North America who unknowingly visited the booby-trapped site. 

๐Ÿ” Stay Safe:

โœ”๏ธ Update Firefox & Windows now!

โœ”๏ธ Watch out for suspicious websites or links.

โœ”๏ธ Use strong security tools to spot weird activity.

"This zero-click exploit shows RomComโ€™s skill and determination to stay hidden and strike hard," warns cybersecurity experts.

Stay alert! ๐Ÿ›ก๏ธ

The gold standard of business news

Morning Brew is transforming the way working professionals consume business news.

They skip the jargon and lengthy stories, and instead serve up the news impacting your life and career with a hint of wit and humor. This way, youโ€™ll actually enjoy reading the newsโ€”and the information sticks.

Best part? Morning Brewโ€™s newsletter is completely free. Sign up in just 10 seconds and if you realize that you prefer long, dense, and boring business newsโ€”you can always go back to it.

Those in GLASSBRIDGEsโ€ฆ ๐Ÿ˜

๐Ÿšจ China-Backed Hacker Group Storm-2077 Targets U.S. Agencies ๐ŸŽฏ

A newly identified Chinese state-sponsored threat actor, Storm-2077, is targeting U.S. government agencies and NGOs, with global attacks extending to industries like defense, aviation, telecom, and finance.

๐ŸŽฏ How They Attack:

๐Ÿ’ฅ Exploit internet-facing devices using public vulnerabilities.

๐Ÿ’ป Deploy Cobalt Strike and open-source malware like Pantegana and Spark RAT.

โœ‰๏ธ Use phishing emails to steal credentials and access sensitive data, including emails via cloud environments.

๐Ÿ” Why It Matters:

Storm-2077 isnโ€™t just after dataโ€”itโ€™s targeting critical infrastructure and sensitive communications that could advance espionage and sabotage efforts.

๐Ÿ“ฐ Fake News Sites & Influence Operations

Meanwhile, Google flagged a pro-China propaganda network called GLASSBRIDGE, using fake news sites to spread pro-Beijing narratives.

๐Ÿ•ต๏ธ Fake PR firms like Shanghai Haixun Technology and Shenzhen Bowen Media disguise themselves as independent media outlets, planting content across subdomains of legitimate news sites.

โš ๏ธ What You Can Do:

โœ”๏ธ Update and secure internet-facing devices.

โœ”๏ธ Be vigilant about phishing emails and suspicious links.

โœ”๏ธ Verify news sources, especially content on unfamiliar subdomains. 

"Storm-2077 is the latest in a long line of advanced Chinese threat actors using evolving tactics to remain undetected," warns Microsoft. Stay alert and secure! ๐Ÿ”

Why struggle with file uploads? Pinataโ€™s File API is your fix

Simplify your development workflow with Pinataโ€™s File API. Add file uploads and retrieval to your app in minutes, without the need for complicated configurations. Pinata provides simple file management so you can focus on creating great features.

Itโ€™s the CHERRY ๐Ÿ’ on the HAT ๐ŸŽฉ #hatvibes ๐Ÿ’€

๐Ÿšจ Russian-Linked Hackers Launch Espionage Campaign ๐ŸŒ

Threat actors tied to Russia, tracked as TAG-110, are targeting government agencies, human rights organizations, and educational institutions in Central Asia, East Asia, and Europe. This group overlaps with Ukraine's UAC-0063, linked to APT28 (Fancy Bear), a notorious Russian cyber-espionage crew.

๐Ÿ› ๏ธ Tools of the Trade:

๐ŸŽฉ HATVIBE: A custom loader that deliversโ€ฆ 

๐Ÿ’ CHERRYSPY: A Python-based backdoor used for data theft and espionage.

๐ŸŽฏ Target Regions:

  • Central Asia: Tajikistan, Kyrgyzstan, Kazakhstan, Turkmenistan, Uzbekistan. 

  • Other Hotspots: Armenia, China, Hungary, India, Greece, and Ukraine. 

๐Ÿ“Š Over 62 victims across 11 countries have been identified, with a primary focus on Central Asiaโ€”likely to gather intel that supports Russiaโ€™s geopolitical ambitions.

๐Ÿ” How They Attack: 

โš™๏ธ Exploit vulnerabilities in public-facing web apps like Rejetto HTTP File Server.

โœ‰๏ธ Use phishing emails to deploy HATVIBE, which then loads CHERRYSPY for spying.

๐Ÿ›ก๏ธ Broader Objectives:

TAG-110's actions align with Russia's ongoing strategy to:

๐Ÿ•ต๏ธ Gather intelligence on geopolitical developments.

๐Ÿ”Œ Sabotage European critical infrastructure in NATO countries like Estonia, Finland, and Poland to destabilize Western alliances.

๐Ÿ’ฃ Complement cyberattacks with physical sabotage as part of Russia's hybrid warfare doctrine, without directly provoking war with NATO. 

"These calculated attacks are designed to weaken NATO and maintain Russian influence in post-Soviet states," says Recorded Future. Expect increased aggression as tensions between Russia and the West continue to escalate. ๐Ÿšจ

๐Ÿ—ž๏ธ Extra, Extra! Read all about it! ๐Ÿ—ž๏ธ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ›ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐Ÿ“…

  • ๐Ÿ’ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐Ÿ†“

  • ๐Ÿ“ˆBitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐Ÿ‘พ

Let us know what you think.

So long and thanks for reading all the phish!

Give us a rating?

Login or Subscribe to participate in polls.

footer graphic cyber security newsletter