Site icon TheCyberThrone

Google Chrome Zero-Day Delivers Memento Spyware

Advertisements

A zero-day vulnerability in Google Chrome, CVE-2025-2783, was actively exploited in early 2025 by attackers using spyware linked to Memento Labs (formerly Hacking Team), a notorious Italian surveillance. The exploit was used in a campaign dubbed Operation ForumTroll, targeting Russian and Belarusian organizations through phishing emails with short-lived links that triggered a Chrome sandbox escape.

About the Vulnerability

The Espionage Tool: Dante

Attribution and Impact

Key Indicators and Recommendations

The CVE-2025-2783 exploit chain targets Chrome’s sandbox protection on Windows, using a vulnerability in the Mojo Inter-Process Communication (IPC) component to escape the browser sandbox and gain code execution on the host system. Below are the core technical details:

Technical Exploit Chain

  1. Initial Access: Delivered via phishing emails or a malicious site; user clicks a crafted link.
  2. Sandbox Escape: Malicious Mojo IPC message sent from compromised renderer leads to a host process returning a privileged handle incorrectly.
  3. Code Execution: Attacker escapes sandbox and runs arbitrary code as the browser’s host process, allowing persistence, malware deployment, and lateral movement.

Severity, Scope, and Impact

Indicators and Detection

MITRE ATT&CK Techniques

This flaw affected not just Chrome but any Chromium-based browser on Windows, and rapid updating is required to prevent exploitation.

Exit mobile version