Mozilla is working on addressing a Firefox bug that has been exploited by tech support scammers to lock the browser when users visit specially crafted websites.
Attacks were spotted recently by Jérôme Segura of Malwarebytes, who told SecurityWeek that there are currently two known Firefox bugs that have been abused in tech support scams.
Exploitation only requires that users visit the websites set up by the cybercrooks. These sites display warnings and instruct victims to call “Windows support” at a specified number.
Segura informed Mozilla of one bug, which has the bug ID 1438214, two years ago, when a very similar flaw had been exploited by scammers against Chrome users. The flaw allows an attacker to freeze the browser by exploiting the download blob API in a way that consumes all CPU resources.
The researcher recently decided to revisit this bug and discovered that it remains unfixed. He also identified a newer bug that has also been exploited by tech support scammers.
“The newer bug abuses notifications by perpetually asking users for the same authorization,” Segura told SecurityWeek, explaining that this flaw appears to be a variation of a previously fixed issue that involved authentication pop-ups and which had been exploited for years.
Based on information in the new bug report created by Segura, Mozilla has known about this issue for at least three months — Mozilla developers flagged Segura’s report as a duplicate — but a fix has yet to be released.
Mozilla has not responded to SecurityWeek’s request for comment, but based on discussions in the bug reports, a patch is expected to be included in Firefox 71, which is scheduled for release on December 3.
Until a patch becomes available, users who encounter the scam websites can forcefully close Firefox from the Task Manager on Windows or using the Force Quit option on macOS — the bug affects Firefox on both Windows and macOS.
Related: Vulnerability Patched in Firefox Password Manager
Related: Firefox Zero-Day Vulnerability Exploited in Targeted Attacks

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- CISA Adds Experts to Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- New York Man Arrested for Running BreachForums Cybercrime Website
- Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies
- Mozilla Patches High-Severity Vulnerabilities With Release of Firefox 111
Latest News
- CISA Adds Experts to Cybersecurity Committee, Updates Baseline Security Goals
- Malware Trends: What’s Old is Still New
- Burnout in Cybersecurity – Can it be Prevented?
- Spain Needs More Transparency Over Pegasus: EU Lawmakers
- Ransomware Will Likely Target OT Systems in EU Transport Sector: ENISA
- Virtual Event Today: Supply Chain & Third-Party Risk Summit
- Google Suspends Chinese Shopping App Amid Security Concerns
- Verosint Launches Account Fraud Detection and Prevention Platform
