Article Details

Original Article Text

Click to Toggle View

Google fixes Chrome zero-day exploited in espionage campaign. ​Google has fixed a high-severity Chrome zero-day vulnerability exploited to escape the browser's sandbox and deploy malware in espionage attacks targeting Russian organizations. "Google is aware of reports that an exploit for CVE-2025-2783 exists in the wild," the company said in a security advisory published Tuesday. Tracked as CVE-2025-2783, this vulnerability was discovered by Kaspersky's Boris Larin and Igor Kuznetsov, who described it as an "incorrect handle provided in unspecified circumstances in Mojo on Windows." Google fixed the zero-day for users in the Stable Desktop channel, with patched versions rolling out worldwide to Windows (134.0.6998.178) users. Although the company says the security update will roll out over days and weeks, it was immediately available when BleepingComputer checked for updates. Users who prefer not to update Chrome manually can let the browser automatically check for new updates and install them after the next launch. ​While it tagged CVE-2025-2783 as exploited in attacks, Google has yet to share further details regarding these incidents and said that "access to bug details and links may be kept restricted until a majority of users are updated with a fix." However, Kaspersky researchers who discovered the actively exploited zero-day also published a report with additional details, saying that attackers use CVE-2025-2783 exploits to bypass Chrome sandbox protections and infect targets with sophisticated malware. The vulnerability is now being exploited in phishing attacks, redirecting victims to the primakovreadings[.]info domain as part of a cyber-espionage campaign targeting Russian organizations, dubbed Operation ForumTroll. While analyzing these attacks, Kaspersky researchers found that the attackers also used a second exploit that enabled remote code execution on compromised systems. Although no information on this additional exploit is available, patching Chrome will disable the entire exploit chain and block potential attacks. ​"While research is still ongoing, but judging by the functionality of the sophisticated malware used in the attack, Kaspersky says the attackers' goal was likely espionage," Kaspersky said. "The malicious emails contained invitations supposedly from the organizers of a scientific and expert forum, 'Primakov Readings,' targeting media outlets, educational institutions and government organizations in Russia. Based on the content of the emails, we dubbed the campaign Operation ForumTroll." CVE-2025-2783 is the first Chrome zero-day patched since the start of 2025. Last year, Google patched 10 zero-days, either exploited in attacks or demoed during the Pwn2Own hacking contest. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Daily Brief Summary

NATION STATE ACTIVITY // Google Patches Chrome Zero-Day Used in Russian Espionage Efforts

Google recently addressed a severe zero-day vulnerability in Chrome, tracked as CVE-2025-2783, exploited for espionage against Russian entities.

The vulnerability allowed attackers to escape the browser's sandbox and deploy sophisticated malware during cyber-espionage attacks.

The exploit was discovered by researchers at Kaspersky, who found it actively used to redirect users as part of Operation ForumTroll.

This campaign targeted Russian organizations through phishing attacks that simulated emails from a legitimate scientific forum.

Besides the initial exploit, attackers used a second vulnerability enabling remote code execution; however, details on this remain undisclosed.

Google rolled out patches quickly in the Stable Desktop channel for Windows users, with immediate availability upon checking for updates.

Researchers recommend updating Chrome to mitigate the risk and disrupt the exploit chain used in the attacks.

This incident marks the first Chrome zero-day patched in 2025, following ten zero-days addressed by Google in the previous year.