Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   559

Google Patches Actively Exploited Chrome Zero-Day (CVE-2025-2783) Used in Espionage C

by Interstellar - 16 April, 2026 - 04:35 AM
This post is by a banned member (Interstellar) - Unhide
5.933
Posts
1.398
Threads
1 Year of service
#1
Google has released an emergency update for Chrome after researchers at Kaspersky discovered an actively exploited zero-day vulnerability being used in a sophisticated espionage campaign targeting media outlets, educational institutions, and government organizations.

What Happened

The vulnerability, tracked as CVE-2025-2783, was found in Mojo — Chrome's inter-process communication (IPC) framework. The flaw allowed attackers to bypass Chrome's sandbox protections entirely, enabling full system compromise simply by having a target click a malicious link.

Kaspersky researchers dubbed the campaign "Operation ForumTroll" after discovering phishing emails impersonating invitations to a legitimate international policy forum. Targets received personalized emails with short-lived links — the URLs expired almost immediately after being clicked to avoid forensic analysis.

Technical Details
  • The exploit chain required no user interaction beyond clicking the link — no downloads, no additional prompts
  • It bypassed Chrome's sandbox by exploiting a logic error in Mojo's handle validation between processes
  • A second exploit (details still undisclosed) was chained for full remote code execution
  • The attack specifically targeted Windows users running x64 Chrome builds

Who Was Targeted

The campaign was highly targeted, focusing on:
  • Russian-speaking media organizations and journalists
  • Educational institutions
  • Government-related entities

The sophistication of the exploit and the targeting pattern suggest a state-sponsored threat actor, though no formal attribution has been made.

What You Should Do

  1. Update Chrome immediately to version 134.0.6998.177/.178 or later
  2. Enable automatic updates if you haven't already
  3. Be cautious of any unsolicited email links, even if they appear legitimate
  4. Consider using browser isolation for sensitive browsing

Why This Matters

Chrome zero-days that escape the sandbox are rare and extremely valuable — they typically sell for $500K+ on the exploit market. The fact that this one was burned on a targeted espionage campaign rather than sold commercially indicates the operators had significant resources and specific intelligence objectives.

This is the first confirmed in-the-wild Chrome zero-day of 2025, and it reinforces why keeping your browser patched is one of the most impactful things you can do for your security posture.

Source: Kaspersky SecureList, Google Chrome Releases Blog

Stay safe out there.
This post is by a banned member (Interstellar) - Unhide
5.933
Posts
1.398
Threads
1 Year of service
#2
(This post was last modified: 16 April, 2026 - 09:01 PM by Interstellar.)
Update: patched versions now rolling out to stable channel. If you haven't restarted your browser today, do it now.

bump
This post is by a banned member (Interstellar) - Unhide
5.933
Posts
1.398
Threads
1 Year of service
Bumped #3
This is a bump
This post is by a banned member (Interstellar) - Unhide
5.933
Posts
1.398
Threads
1 Year of service
Bumped #4
This is a bump
This post is by a banned member (Interstellar) - Unhide
5.933
Posts
1.398
Threads
1 Year of service
Bumped #5
This is a bump
This post is by a banned member (Interstellar) - Unhide
5.933
Posts
1.398
Threads
1 Year of service
Bumped #6
This is a bump
This post is by a banned member (Interstellar) - Unhide
5.933
Posts
1.398
Threads
1 Year of service
Bumped #7
This is a bump
This post is by a banned member (Interstellar) - Unhide
5.933
Posts
1.398
Threads
1 Year of service
#8
Bump!

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)