Urgent Alert: Chrome Zero-Day Vulnerability Used to Distribute Italian Memento Labs’ LeetAgent Spyware

Admin

Urgent Alert: Chrome Zero-Day Vulnerability Used to Distribute Italian Memento Labs’ LeetAgent Spyware

A recent security flaw in Google Chrome has raised alarms across the tech world. This zero-day vulnerability, known as CVE-2025-2783, has made headlines after being exploited by a group linked to espionage. Experts from Kaspersky have uncovered that a tool developed by the Italian firm Memento Labs was used in these attacks.

CVE-2025-2783 has a CVSS score of 8.3, indicating a high level of severity. It allows attackers to escape the confines of the browser and deliver malicious software through phishing emails. These emails contain specialized links that entice users to click, particularly targeting organizations in Russia. The campaign, dubbed Operation ForumTroll, has been active since February 2024, with a focus on media outlets, government bodies, and financial institutions.

Boris Larin, a security researcher at Kaspersky, emphasized that this operation is highly targeted. Many victims received tailored phishing attempts, indicating that the attackers invested time in understanding their targets. This level of sophistication reflects a worrying trend; cyberattacks are evolving from broad-based strategies to highly focused tactics designed to exploit specific vulnerabilities.

Memento Labs, created in 2019 from a merger of prior cybersecurity entities, has a controversial history. Its predecessor, Hacking Team, faced significant backlash after a massive data breach in 2015 that exposed their tools to the public. This history begs the question: How do past behaviors influence current practices in cybersecurity firms?

Interestingly, the linked spyware, known as LeetAgent, utilizes a unique set of commands, allowing attackers to execute various tasks remotely. This could include running scripts, stopping tasks, and even collecting sensitive files. The malware’s sophistication suggests that the threat actors have a deep understanding of their coding and operational techniques.

Moreover, data from Positive Technologies reveals that similar tactics exploiting the same Chrome flaw were identified, hinting at a coordinated effort among threat actors. Specifically, a backdoor called Trinper was deployed and is believed to be associated with the same group.

Social media reactions to these findings have been mixed. Users express frustration and concern about ongoing vulnerabilities in widely-used software. Some argue that tech companies must prioritize security, while others feel that users must take more responsibility for their cyber safety.

As cyber threats become increasingly complex, the landscape of digital security must adapt. Understanding the motives and methods of these attackers can empower organizations to bolster their defenses. Although this incident highlights a pressing risk, it also serves as a reminder that staying informed is key to cybersecurity.

For more in-depth information about CVE-2025-2783 and its implications, check out Kaspersky’s report [here](https://securelist.com/forumtroll-apt-hacking-team-dante-spyware/117851/).



Source link

cyber security news, cyber news, cyber security news today, cyber security updates, cyber updates, hacker news, hacking news, software vulnerability, cyber attacks, data breach, ransomware malware, how to hack, network security, information security, the hacker news, computer security