RomCom Exploits Zero-Day Firefox and Windows Flaws in Sophisticated Cyberattacks

Discussion in 'malware problems & news' started by Rasheed187, Dec 5, 2024.

  1. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    A good reminder to use some form of anti-exploit (AE), I'm not sure if all AV's would be able to block this stuff. You need a tool that can block malicious process execution that is triggered by some browser exploit.

    On the other hand, it's not clear to me if this malware loads in-memory (or fileless) inside the browser process, if so, then process execution monitoring isn't enough. Then you need more advanced AE like MBAE or HMPA to stop the exploit at an earlier stage.

    https://thehackernews.com/2024/11/romcom-exploits-zero-day-firefox-and.html?m=1
     
  2. T-RHex

    T-RHex Registered Member

    Joined:
    Jun 10, 2009
    Posts:
    256
    I wonder if Malwarebytes Browser Guard would've blocked this.
     
  3. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    I wouldn't bet on it, since I assume it only checks for known malicious websites.

    Like I said, it's better to rely on anti-exploit tools, they can't identify the malware itself (like most AV's) but they simply block the exploition technique, or try to block malware from loading, by blocking unknown child processes from the browser for example.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.