Source: The Hacker News Author: [email protected] (The Hacker News) URL: https://thehackernews.com/2025/03/zero-day-alert-google-releases-chrome.html
ONE SENTENCE SUMMARY:
Google patched a high-severity Chrome vulnerability (CVE-2025-2783) actively exploited in a phishing campaign targeting Russian organizations with espionage intent.
MAIN POINTS:
- Google released an out-of-band fix for Chrome vulnerability CVE-2025-2783 on Windows.
- The flaw involves incorrect handle usage in Mojo, impacting inter-process communication.
- It has been actively exploited in targeted attacks against Russian organizations.
- Google has not disclosed details about the attackers or affected victims.
- The vulnerability was discovered by Kaspersky researchers Boris Larin and Igor Kuznetsov.
- Kaspersky links the attacks to an APT group under Operation ForumTroll.
- Victims were infected by clicking phishing links leading to malicious websites.
- The flaw allows bypassing Chrome’s sandbox protection on Windows.
- The phishing campaign impersonated organizers of the Primakov Readings forum.
- Attackers likely used a second exploit for remote code execution, which remains undiscovered.
TAKEAWAYS:
- Chrome users should update to version 134.0.6998.177/.178 immediately to mitigate risks.
- State-sponsored APT groups continue using sophisticated zero-day exploits for espionage.
- Phishing remains a primary infection vector in targeted cyberattacks.
- Sandboxing mechanisms can be bypassed through logical vulnerabilities in software.
- Organizations must remain vigilant against highly tailored phishing campaigns.