Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chrome Zero-Day Exploitation Linked to Hacking Team Spyware

Posted on October 27, 2025October 27, 2025 By CWS

The exploitation of the primary Chrome zero-day of 2025 is linked to instruments utilized in assaults involving Hacking Workforce’s new adware, Kaspersky studies.

The exploited Chrome vulnerability, tracked as CVE-2025-2783 and described as a sandbox escape situation, was caught within the wild in a classy cyberespionage marketing campaign attributed to a state-sponsored APT. Firefox was affected by an identical flaw, tracked as CVE-2025-2857.

Dubbed Operation ForumTroll, the marketing campaign focused training, finance, authorities, media, analysis, and different organizations in Russia and used phishing emails masquerading as discussion board invites to ship personalised, short-lived hyperlinks taking victims to web sites containing the exploit for CVE-2025-2783.

The code was designed to validate the consumer, bypass Chrome’s sandbox, and execute shellcode, resulting in the set up of a malware loader. To attain persistence, the code positioned new entries within the consumer registry to hijack Home windows’s search order for COM objects.

In Operation ForumTroll, the ultimate payload was LeetAgent, a bit of adware written in leetspeak that might obtain instructions over HTTPS, log keystrokes, and steal recordsdata, Kaspersky explains in a contemporary report.

Primarily based on instructions obtained from its command-and-control (C&C) server – hosted on Fastly.internet cloud infrastructure – the adware may execute instructions within the command immediate, execute processes, inject shellcode, and browse/write recordsdata.

LeetAgent has been used since no less than 2022 in assaults focusing on organizations in Russia and Belarus, and, in some cases, has been used to deploy a extra subtle adware household, developed by the Italian firm Memento Labs (previously Hacking Workforce – or HackingTeam).

Based in 2003, Hacking Workforce is greatest recognized for the Distant Management Programs (RCS) adware, which was well-liked amongst governments worldwide. Following the leak of inside information in 2015, Hacking Workforce was acquired by InTheCyber Group in 2019, and rebranded Memento Labs.Commercial. Scroll to proceed studying.

Memento’s new surveillance software, named Dante, shares a number of similarities with RCS, which was also referred to as Da Vinci, and reveals a concentrate on evading detection and evaluation.

It depends on an orchestrator that hundreds modules downloaded and saved domestically. The orchestrator too packs anti-analysis capabilities and performs numerous checks on the contaminated system. If the adware doesn’t obtain instructions from the C&C inside a specified interval, it deletes itself from the system.

In response to Kaspersky, the menace actor behind Operation ForumTroll was not noticed utilizing Dante on this marketing campaign, however used it in different assaults that employed the identical toolset.

“Notably, we noticed a number of minor similarities between this assault and others involving Dante, similar to related file system paths, the identical persistence mechanism, information hidden in font recordsdata, and different minor particulars. Most significantly, we discovered related code shared by the exploit, loader, and Dante,” Kaspersky notes.

Associated: North Korean Hackers Goal at European Drone Firms

Associated: NSO Ordered to Cease Hacking WhatsApp, however Damages Minimize to $4 Million

Associated: In Different Information: iOS 26 Deletes Spy ware Proof, Shadow Escape Assault, Cyber Exec Bought Secrets and techniques to Russia

Associated: Austria’s Kurz Units up Cyber Agency With Ex-NSO Chief

Security Week News Tags:Chrome, Exploitation, Hacking, Linked, Spyware, Team, ZeroDay

Post navigation

Previous Post: Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack
Next Post: HashiCorp Vault Vulnerabilities Let Attack Bypass Authentication And Trigger DoS Attack

Related Posts

Company and Personal Data Compromised in Recent Insight Partners Hack  Security Week News
In Other News: Hackers Not Behind Blackout, CISO Docuseries, Dior Data Breach Security Week News
Valuable Information Leaked in LockBit Ransomware Hack  Security Week News
CSA Unveils SaaS Security Controls Framework to Ease Complexity Security Week News
Developer Who Hacked Former Employer’s Systems Sentenced to Prison Security Week News
Chinese Spies Exploit Ivanti Vulnerabilities Against Critical Sectors Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chainguard Raises $280 Million in Growth Funding
  • Massive China-Linked Smishing Campaign Leveraged 194,000 Domains
  • North Korean Chollima Actors Added BeaverTail and OtterCookie to Its Arsenal
  • WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens
  • Hackers Actively Exploiting WordPress Arbitrary Installation Vulnerabilities in The Wild

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chainguard Raises $280 Million in Growth Funding
  • Massive China-Linked Smishing Campaign Leveraged 194,000 Domains
  • North Korean Chollima Actors Added BeaverTail and OtterCookie to Its Arsenal
  • WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens
  • Hackers Actively Exploiting WordPress Arbitrary Installation Vulnerabilities in The Wild

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News