Created on 2025-03-26 07:46 and updated on 2025-03-26 07:46.

Description

Operation ForumTroll exploits zero-days in Google Chrome | Securelist

Incidents

Incidents

25 Mar 2025

minute read

In mid-March 2025, Kaspersky technologies detected a wave of infections by previously unknown and highly sophisticated malware. In all cases, infection occurred immediately after the victim clicked on a link in a phishing email, and the attackers’ website was opened using the Google Chrome web browser. No further action was required to become infected.

All malicious links were personalized and had a very short lifespan. However, Kaspersky’s exploit detection and protection technologies successfully identified the zero-day exploit that was used to escape Google Chrome’s sandbox. We quickly analyzed the exploit code, reverse-engineered its logic, and confirmed that it was based on a zero-day vulnerability affecting the latest version of Google Chrome. We then reported the vulnerability to the Google security team. Our detailed report enabled the developers to quickly address the issue, and on March 25, 2025, Google released an update fixing the vulnerability and thanked us for discovering this attack.

Acknowledgement for finding CVE-2025-2783 (excerpt from security fixes included into Chrome 134.0.6998.177/.178)

Acknowledgement for finding CVE-2025-2783 (excerpt from security fixes included into Chrome 134.0.6998.177/.178)

We have discovered and reported dozens of zero-day exploits actively used in attacks, but this particular exploit is certainly one of the most interesting we’ve encountered. The vulnerability CVE-2025-2783 really left us scratching our heads, as, without doing anything obviously malicious or forbidden, it allowed the attackers to bypass Google Chrome’s sandbox protection as if it didn’t even exist. The cause of this was a logical error at the intersection of Google Chrome’s sandbox and the Windows operating system. We plan to publish the technical details of this vulnerability once the majority of users have installed the updated version of the browser that fixes it.

Our research is still ongoing, but judging by the functionality of the sophisticated malware used in the attack, it seems the attackers’ goal was espionage. The malicious emails contained invitations supposedly from the organizers of a scientific and expert forum, “Primakov Readings”, targeting media outlets and educational institutions in Russia. Based on the content of the emails, we dubbed the campaign Operation ForumTroll.

Example of a malicious email used in this campaign (translated from Russian)

Example of a malicious email used in this campaign (translated from Russian)

At the time of writing, there’s no exploit active at the malicious link – it just redirects visitors to the official website of “Primakov Readings”. However, we strongly advise against clicking on any potentially malicious links.

The exploit we discovered was designed to run in conjunction with an additional exploit that enables remote code execution. Unfortunately, we were unable to obtain this second exploit, as in this particular case it would have required waiting for a new wave of attacks and exposing users to the risk of infection. Fortunately, patching the vulnerability used to escape the sandbox effectively blocks the entire attack chain.

All the attack artifacts analyzed so far indicate high sophistication of the attackers, allowing us to confidently conclude that a state-sponsored APT group is behind this attack.

We plan to publish a detailed report with technical details about the zero-day exploit, the sophisticated malware, and the attackers’ techniques.

Kaspersky products detect the exploits and malware used in this attack with the following verdicts:

  • Exploit.Win32.Generic
  • Trojan.Win64.Agent
  • Trojan.Win64.Convagent.gen
  • PDM:Exploit.Win32.Generic
  • PDM:Trojan.Win32.Generic
  • UDS:DangerousObject.Multi.Generic

Indicators of Compromise

primakovreadings[.]info

Latest Posts
Latest Webinars
Reports

In this article, we discuss the tools and TTPs used in the SideWinder APT’s attacks in H2 2024, as well as shifts in its targets, such as an increase in attacks against the maritime and logistics sectors.

Kaspersky researchers analyze EAGERBEE backdoor modules, revealing a possible connection to the CoughingDown APT actor.

While investigating an incident involving the BellaCiao .NET malware, Kaspersky researchers discovered a C++ version they dubbed “BellaCPP”.

Lazarus targets employees of a nuclear-related organization with a bunch of malware, such as MISTPEN, LPEClient, RollMid, CookieTime and a new modular backdoor CookiePlus.

Vulnerabilities included in this bundle

Author

Alexandre Dulaunoy

Combined sightings

Author Vulnerability Source Type Date
automationCVE-2025-2783https://bsky.app/profile/pmloik.bsky.social/post/3llscvli5nx2lseen2 hours ago
automationCVE-2025-2783https://bsky.app/profile/pmloik.bsky.social/post/3llp562uepu2useen1 day ago
automationCVE-2025-2783https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llolapvrmfk2seen1 day ago
automationCVE-2025-2783https://bsky.app/profile/getpokemon7.bsky.social/post/3llkndnm3tk2bseen3 days ago
automationCVE-2025-2783https://bsky.app/profile/getpokemon7.bsky.social/post/3llkn7pthqs2bseen3 days ago
automationCVE-2025-2783https://bsky.app/profile/getpokemon7.bsky.social/post/3llklklomoc2bseen3 days ago
automationCVE-2025-2783https://bsky.app/profile/getpokemon7.bsky.social/post/3llklfk3usk2bseen3 days ago
automationCVE-2025-2783https://bsky.app/profile/getpokemon7.bsky.social/post/3llkl5ito5c2bseen3 days ago
automationCVE-2025-2783https://bsky.app/profile/getpokemon7.bsky.social/post/3llkkgc236s2bseen3 days ago
automationCVE-2025-2783https://bsky.app/profile/getpokemon7.bsky.social/post/3llkjjppfts2bseen3 days ago
automationCVE-2025-2783https://bsky.app/profile/redteamnews.bsky.social/post/3lljftb74ws2qseen3 days ago
automationCVE-2025-2783https://poliverso.org/objects/0477a01e-710f0b64-f57987e600385f31seen3 days ago
automationCVE-2025-2783https://poliverso.org/objects/0477a01e-710f0b64-f57987e600385f31seen3 days ago
automationCVE-2025-2783https://bsky.app/profile/hacker.at.thenote.app/post/3lliu6etv622xseen3 days ago
automationCVE-2025-2783https://bsky.app/profile/PepikHipik.infosec.exchange.ap.brid.gy/post/3llis5rtokyz2seen3 days ago
automationCVE-2025-2783https://bsky.app/profile/pepikhipik.bsky.social/post/3llis62ex2c2jseen3 days ago
automationCVE-2025-2783https://bsky.app/profile/phukiendinh.bsky.social/post/3lliqsm7ugq2fseen3 days ago
automationCVE-2025-2783https://bsky.app/profile/gadgetsmagazine.bsky.social/post/3lliefi4bm52vseen4 days ago
automationCVE-2025-2783https://bsky.app/profile/beikokucyber.bsky.social/post/3llhpl52uvi2aseen4 days ago
automationCVE-2025-2783https://mstdn.ca/users/rfwaveio/statuses/114242016209065106seen4 days ago
automationCVE-2025-2783https://mstdn.ca/users/rfwaveio/statuses/114242016209065106seen4 days ago
automationCVE-2025-2783https://bsky.app/profile/ehcgroup.bsky.social/post/3llhkgod2ic26seen4 days ago
automationCVE-2025-2783https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llgmrugzeu52seen4 days ago
automationCVE-2025-2783https://bsky.app/profile/redteamnews.bsky.social/post/3llgmaogv4z23seen4 days ago
automationCVE-2025-2783https://bsky.app/profile/oct0xor.bsky.social/post/3llgkvajsb22yseen4 days ago
automationCVE-2025-2783https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llgiexjtc552seen4 days ago
automationCVE-2025-2783https://bsky.app/profile/andranglin.bsky.social/post/3llggw2m2tk2eseen4 days ago
automationCVE-2025-2783https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llgf5ugpnof2seen4 days ago
automationCVE-2025-2783https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llgdg4uf5ac2seen4 days ago
automationCVE-2025-2783https://bsky.app/profile/it-connect.bsky.social/post/3llgak6i6od2sseen4 days ago
automationCVE-2025-2783https://bsky.app/profile/opera-security.bsky.social/post/3llfdfkwhss2fseen5 days ago
automationCVE-2025-2783https://bsky.app/profile/cti-news.bsky.social/post/3llf57sriyw2sseen5 days ago
automationCVE-2025-2783https://bsky.app/profile/kitafox.bsky.social/post/3llf3vyp6tf2rseen5 days ago
automationCVE-2025-2783https://bsky.app/profile/cyberalerts.bsky.social/post/3llexhibvpc2nseen5 days ago
automationCVE-2025-2783https://bsky.app/profile/cyberalerts.bsky.social/post/3llexh7bwmi24seen5 days ago
automationCVE-2025-2783https://bsky.app/profile/aakl.bsky.social/post/3llewlolpv32cseen5 days ago
automationCVE-2025-2783https://bsky.app/profile/aakl.bsky.social/post/3llew35zjy32cseen5 days ago
automationCVE-2025-2783https://bsky.app/profile/aakl.bsky.social/post/3llew35zjy22cseen5 days ago
automationCVE-2025-2783https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lldz324fxsh2seen5 days ago
automationCVE-2025-2783https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lldulcrwtpj2seen5 days ago
automationCVE-2025-2783https://bsky.app/profile/infosec.skyfleet.blue/post/3llduxxvs652nseen5 days ago
automationCVE-2025-2783https://bsky.app/profile/basefortify.bsky.social/post/3lldt5ugajk2xseen5 days ago
automationCVE-2025-2783https://bsky.app/profile/hackuritate.bsky.social/post/3lldswl36ac2wseen5 days ago
automationCVE-2025-2783https://bsky.app/profile/hacker.at.thenote.app/post/3lldrr5ecbk2xseen5 days ago
automationCVE-2025-2783https://bsky.app/profile/deskmodder.de/post/3lldmyxbb472rseen5 days ago
automationCVE-2025-2783https://bsky.app/profile/kitafox.bsky.social/post/3llcqvfwgew2xseen6 days ago
automationCVE-2025-2783https://bsky.app/profile/beikokucyber.bsky.social/post/3llcon576cf2xseen6 days ago
automationCVE-2025-2783https://bsky.app/profile/getpokemon7.bsky.social/post/3llcnz6nxic2mseen6 days ago
automationCVE-2025-2783https://bsky.app/profile/tperry603.bsky.social/post/3llc5kghpds2sseen6 days ago
automationCVE-2025-2783https://bsky.app/profile/hackingne.ws/post/3llbxd4uhcm2pseen6 days ago
automationCVE-2025-2783https://bsky.app/profile/securityrss.bsky.social/post/3llbwjmngg22nseen6 days ago
automationCVE-2025-2783https://bsky.app/profile/jbhall56.bsky.social/post/3llbtolzo6k24seen6 days ago
automationCVE-2025-2783https://bsky.app/profile/jbhall56.bsky.social/post/3llbtmrf4es24seen6 days ago
automationCVE-2025-2783https://bsky.app/profile/helpnetsecurity.com/post/3llbnk5gwcs2qseen6 days ago
automationCVE-2025-2783https://bsky.app/profile/shiojiri.com/post/3llbmayemoc2wseen6 days ago
automationCVE-2025-2783https://bsky.app/profile/basefortify.bsky.social/post/3llbhxarkqk2mseen6 days ago
automationCVE-2025-2783https://bsky.app/profile/basefortify.bsky.social/post/3llbhxarjrc2mseen6 days ago
automationCVE-2025-2783https://bsky.app/profile/basefortify.bsky.social/post/3llbhx7acl22mseen6 days ago
automationCVE-2025-2783https://bsky.app/profile/andranglin.bsky.social/post/3llbh3q2q5s2oseen6 days ago
automationCVE-2025-2783https://bsky.app/profile/mbissey.bsky.social/post/3llbgl5yeap2bseen6 days ago
automationCVE-2025-2783https://bsky.app/profile/nimblenerd.social/post/3llba7szsqs2qseen6 days ago
automationCVE-2025-2783https://bsky.app/profile/defendopsdiaries.bsky.social/post/3llb75xyfq327seen6 days ago
automationCVE-2025-2783https://bsky.app/profile/bettycjung.bsky.social/post/3llb5zmro4s2eseen6 days ago
automationCVE-2025-2783https://thehackernews.com/2025/03/zero-day-alert-google-releases-chrome.htmlseen7 days ago
automationCVE-2025-2783https://bsky.app/profile/getpokemon7.bsky.social/post/3llaty5xc4k25seen7 days ago
automationCVE-2025-2783https://bsky.app/profile/getpokemon7.bsky.social/post/3llatv7qkgs25seen7 days ago
automationCVE-2025-2783https://bsky.app/profile/azaka.fun/post/3llat2ybhcc2sseen7 days ago
automationCVE-2025-2783https://bsky.app/profile/azaka.fun/post/3llat2ufrc22sseen7 days ago
automationCVE-2025-2783https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llaov65bhze2seen7 days ago
automationCVE-2025-2783https://bsky.app/profile/securitylab-jp.bsky.social/post/3llamoakxws2zseen7 days ago
automationCVE-2025-2783https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llahp6xeqqu2seen7 days ago
automationCVE-2025-2783https://bsky.app/profile/nimblenerd.social/post/3llafep5vld2aseen7 days ago
automationCVE-2025-2783https://bsky.app/profile/oct0xor.bsky.social/post/3llabgyspos2tseen7 days ago