Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chrome Zero-Day Exploitation Linked to Hacking Team Spyware

Posted on October 27, 2025October 27, 2025 By CWS

The exploitation of the primary Chrome zero-day of 2025 is linked to instruments utilized in assaults involving Hacking Workforce’s new adware, Kaspersky studies.

The exploited Chrome vulnerability, tracked as CVE-2025-2783 and described as a sandbox escape situation, was caught within the wild in a classy cyberespionage marketing campaign attributed to a state-sponsored APT. Firefox was affected by an identical flaw, tracked as CVE-2025-2857.

Dubbed Operation ForumTroll, the marketing campaign focused training, finance, authorities, media, analysis, and different organizations in Russia and used phishing emails masquerading as discussion board invites to ship personalised, short-lived hyperlinks taking victims to web sites containing the exploit for CVE-2025-2783.

The code was designed to validate the consumer, bypass Chrome’s sandbox, and execute shellcode, resulting in the set up of a malware loader. To attain persistence, the code positioned new entries within the consumer registry to hijack Home windows’s search order for COM objects.

In Operation ForumTroll, the ultimate payload was LeetAgent, a bit of adware written in leetspeak that might obtain instructions over HTTPS, log keystrokes, and steal recordsdata, Kaspersky explains in a contemporary report.

Primarily based on instructions obtained from its command-and-control (C&C) server – hosted on Fastly.internet cloud infrastructure – the adware may execute instructions within the command immediate, execute processes, inject shellcode, and browse/write recordsdata.

LeetAgent has been used since no less than 2022 in assaults focusing on organizations in Russia and Belarus, and, in some cases, has been used to deploy a extra subtle adware household, developed by the Italian firm Memento Labs (previously Hacking Workforce – or HackingTeam).

Based in 2003, Hacking Workforce is greatest recognized for the Distant Management Programs (RCS) adware, which was well-liked amongst governments worldwide. Following the leak of inside information in 2015, Hacking Workforce was acquired by InTheCyber Group in 2019, and rebranded Memento Labs.Commercial. Scroll to proceed studying.

Memento’s new surveillance software, named Dante, shares a number of similarities with RCS, which was also referred to as Da Vinci, and reveals a concentrate on evading detection and evaluation.

It depends on an orchestrator that hundreds modules downloaded and saved domestically. The orchestrator too packs anti-analysis capabilities and performs numerous checks on the contaminated system. If the adware doesn’t obtain instructions from the C&C inside a specified interval, it deletes itself from the system.

In response to Kaspersky, the menace actor behind Operation ForumTroll was not noticed utilizing Dante on this marketing campaign, however used it in different assaults that employed the identical toolset.

“Notably, we noticed a number of minor similarities between this assault and others involving Dante, similar to related file system paths, the identical persistence mechanism, information hidden in font recordsdata, and different minor particulars. Most significantly, we discovered related code shared by the exploit, loader, and Dante,” Kaspersky notes.

Associated: North Korean Hackers Goal at European Drone Firms

Associated: NSO Ordered to Cease Hacking WhatsApp, however Damages Minimize to $4 Million

Associated: In Different Information: iOS 26 Deletes Spy ware Proof, Shadow Escape Assault, Cyber Exec Bought Secrets and techniques to Russia

Associated: Austria’s Kurz Units up Cyber Agency With Ex-NSO Chief

Security Week News Tags:Chrome, Exploitation, Hacking, Linked, Spyware, Team, ZeroDay

Post navigation

Previous Post: Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack
Next Post: HashiCorp Vault Vulnerabilities Let Attack Bypass Authentication And Trigger DoS Attack

Related Posts

Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case Security Week News
Cisco Patches Zero-Day Flaw Affecting Routers and Switches Security Week News
Several Vulnerabilities Patched in AI Code Editor Cursor  Security Week News
SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability Security Week News
Gabbard Says UK Scraps Demand for Apple to Give Backdoor Access to Data Security Week News
200,000 Harbin Clinic Patients Impacted by NRS Data Breach Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Policy, Isolation, and Data Controls That Actually Work
  • Ashen Lepus Hacker Group Attacks Eastern Diplomatic Entities With New AshTag Malware
  • Apache Struts 2 DoS Vulnerability Let Attackers Crash Server
  • New React RSC Vulnerabilities Enable DoS and Source Code Exposure
  • $320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Policy, Isolation, and Data Controls That Actually Work
  • Ashen Lepus Hacker Group Attacks Eastern Diplomatic Entities With New AshTag Malware
  • Apache Struts 2 DoS Vulnerability Let Attackers Crash Server
  • New React RSC Vulnerabilities Enable DoS and Source Code Exposure
  • $320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark