CVE-2025-2783 in Operation ForumTroll APT | Kaspersky official blog

Our exploit detection and prevention technologies have detected a new wave of cyberattacks with previously unknown malware. While analyzing it, our Global Research and Analysis Team (GReAT) experts realized that we’re dealing with a technically sophisticated targeted attack, which suggests that a state-sponsored APT group is behind it. The attack exploited a zero-day vulnerability in the Chrome browser, which we immediately reported to Google; the company promptly released a patch to fix it.

What is the Operation ForumTroll APT attack?

The attack starts with an email with a phishing invitation to the Primakov Readings international economic and political science forum. There are two links in the email’s body, which pretend to lead to the program of the event and the registration form for participants, but which actually lead to the malefactor’s website. If a Windows PC user with the Google Chrome browser (or any other browser based on the Chromium engine) clicks them, their computer gets infected with no additional action required from the victim’s side.

Next, the exploit for the CVE-2025-2783 vulnerability comes into play — helping to circumvent the Chrome browser’s defense mechanism. It’s too early to talk about technical details, but the essence of the vulnerability comes down to an error in logic at the intersection of Chrome and the Windows operating system that allows bypassing the browser’s sandbox protection.

A slightly more detailed technical description of the attack along with the indicators of compromise can be found on our Securelist blog. Our GReAT experts will publish a thorough technical analysis of the vulnerability and APT attack once the majority of browser users install the newly-released patch.

Who are the targets of the Operation ForumTroll APT attack?

Fake event invitations containing personalized links were sent to Russian media representatives, employees of educational institutions and governmental organizations. According to our GReAT experts the goal of the attackers was espionage.

How to stay safe

At the time of writing this post, the attack was no longer active: the phishing link redirected users to the legitimate Primakov Readings website. However, the malefactors could reactivate the exploit delivery mechanism at any time and start the next wave of the attack.

Thanks to our experts’ analysis, Google Chrome’s developers have promptly fixed the CVE-2025-2783 vulnerability today, and thus we advise you to check that your organization uses the browser updated to at least the 134.0.6998.177/.178 version.

In addition, we recommend using reliable security solutions equipped with modern exploit detection and prevention technologies on all internet-connected corporate devices. Our products successfully detect all exploits and other malware used in this APT attack.

Kaspersky official blog – ​Read More

Nearly $13 million stolen from Abracadabra Finance in crypto heist

The crypto lending platform said the issue was sourced back to a product it calls “cauldrons” — isolated lending markets that allow users to borrow against a variety of cryptocurrencies.

The Record from Recorded Future News – ​Read More

After Detecting 30B Phishing Attempts, Microsoft Adds Even More AI to Its Security Copilot

Microsoft is partnering with top firms to launch new AI security tools, boosting breach analysis, threat detection, and AI model protection across cloud platforms.

Security | TechRepublic – ​Read More

Malaysia PM says country rejected $10 million ransom demand after airport outages

Computer outages at Malaysia’s Kuala Lumpur International Airport (KLIA) this weekend were attributed to a recent cyberattack, according to the country’s cybersecurity agency and aviation authority.

The Record from Recorded Future News – ​Read More

Satellite Navigation Systems Facing Rising Jamming and Spoofing Attacks

Satellite navigation systems are under rising threat from jamming and spoofing attacks, risking aviation, maritime, and telecom safety worldwide, warn global agencies.

Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News – ​Read More

Alleged Snowflake hacker consents to extradition from Canada after US charges

Connor Riley Moucka signed a consent order on Friday in Ontario Superior Court in Kitchener that would allow him to be transferred to U.S. custody to face multiple charges.

The Record from Recorded Future News – ​Read More

23andMe files for bankruptcy: How to delete your data

23andMe holds millions of customers’ genetic information. Here’s what you can do to protect your data.

Security News | TechCrunch – ​Read More

Accused Snowflake Attacker ‘Judische’ Agrees to US Extradition

Though there is no confirmation as to when this extradition will occur, Alexander Moucka agreed to be transferred in writing before a judge.

darkreading – ​Read More

What is Signal? 7 features that make it a go-to app for private, secure messaging

Signal is in the news for all the wrong reasons. Here’s what to know about it and why it remains a top choice for protecting conversations.

Latest stories for ZDNET in Security – ​Read More

Hackers Are Using Microsoft’s .NET MAUI to Spread Android Malware

McAfee Labs reveals new Android malware exploiting .NET MAUI to steal user data. Learn about advanced evasion techniques and how to stay protected.

Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News – ​Read More