An attack is detected utilizing a recent Firefox zero-day and malware payloads in order to gain access to victim’s computers, networks, and sensitive information. Mozilla released an emergency Firefox update to fix a critical remote execution vulnerability that was actively used in targeted attacks in the wild. This bug was given a CVE ID of CVE-2019-11707 while the vulnerability could be exploited for remote code execution, it would need to be chained with a sandbox escape vulnerability CVE-2019-11708 in order to affect the host operating system.
Cryptocurrency firms were the target of attacks utilizing this exploit. Their goal was most likely to gain access to corporate information, stored cryptocurrency funds, or their networks. The phishing email that allegedly initiated these attacks claimed to be an “Adam Prize Organizer” named Neil Morris who was requesting assistance from the target. This email contained a now defunct url of http://people.ds.cam.ac.uk/nm603/awards/Adams_Prize. When a user visited this URL with Firefox, the exploit would drop a malicious payload on the computer. This trojan is a Remote Access Trojan, or RAT, that would allow an attacker to gain full access to the infected computer. In addition to RAT capabilities, Netwire is designed to steal information from browsers and other applications.