Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Fake Laravel packages on Packagist deploy RAT on Windows, macOS, and Linux

Artemis II mission sets stage for lunar return and beyond

APT41-linked Silver Dragon uses Cobalt Strike and Google Drive C2 to target governments

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Google releases Chrome patches for exploits used in Russian spy attacks
Identity

Google releases Chrome patches for exploits used in Russian spy attacks

userBy userMarch 26, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 26, 2025Ravi LakshmananBrowser security/vulnerabilities

Google has released an out-of-band fix to address a sophisticated security flaw in the Chrome browser for Windows that is said to have been exploited in the wild as part of an attack targeting Russian organizations.

The vulnerability tracked as CVE-2025-2783 is described as a case of “incorrect handles provided in unspecified situations in window mojos.” Mojo refers to a collection of runtime libraries that provide a platform-independent mechanism for inter-process communication (IPC).

As is conventional, Google did not reveal any additional technical details about the nature of the attack, the identity of the threat actors behind it, and who could have been targeted. The vulnerability is connected to Chrome version 134.0.6998.177/.178 for Windows.

Cybersecurity

“Google is aware of reports of CVE-2025-2783 exploits present in the wild,” the Tech giant admitted in concise advice.

It is worth noting that CVE-2025-2783 is the first actively and actively used Chrome Zero Day since the beginning of this year. Kaspersky researchers Boris Larin and Igor Kuznetsov are admitted to have discovered and reported the shortcomings on March 20, 2025.

In its own bulletin, the Russian cybersecurity vendor characterized the exploitation of zero-days, CVE-2025-2783 as a technically sophisticated target attack. It tracks activities under the name Operation ForumTroll.

“In all cases, the infection occurred shortly after the victim clicked on a phishing email link and the attacker’s website was opened using the Google Chrome web browser,” the researcher said. “We didn’t need any further action to get infected.”

“The essence of vulnerabilities comes down to logic errors at the intersection of Chrome and Windows operating systems that can bypass browser sandbox protection.”

Cybersecurity

The short-lived link is said to have been personalized by the target, and spies are the ultimate goal of the campaign. Caspersky said the malicious email included an invitation from the organizers of Primakov Readings, a legitimate scientific and expert forum.

Phishing targets Russian media, educational institutions and governmental organizations. Additionally, CVE-2025-2783 is designed to be run in conjunction with additional exploits that facilitate remote code execution. Kaspersky said he could not get a second exploit.

“All attack artifacts analyzed so far show a high level of sophistication in the attack, allowing us to confidently conclude that state-sponsored APT groups are behind this attack,” the researchers said.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNew security flaws in VMware tools and CrushFTP – high risk, no workaround
Next Article Houthis says 17 airstrikes struck Yemen as rebels attacked us, Israel’s target | Houthis News
user
  • Website

Related Posts

Fake Laravel packages on Packagist deploy RAT on Windows, macOS, and Linux

March 4, 2026

APT41-linked Silver Dragon uses Cobalt Strike and Google Drive C2 to target governments

March 4, 2026

CISA adds actively exploited VMware Aria operational flaw CVE-2026-22719 to KEV catalog

March 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Fake Laravel packages on Packagist deploy RAT on Windows, macOS, and Linux

Artemis II mission sets stage for lunar return and beyond

APT41-linked Silver Dragon uses Cobalt Strike and Google Drive C2 to target governments

UK allocates £30m to strengthen satellite communications sector

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.