Operation ForumTroll exploits zero-days in Google Chrome
March 26, 2025, 1:20 p.m.
Description
In March 2025, a sophisticated malware campaign exploited a zero-day vulnerability in Google Chrome to infect targets. The attack, dubbed Operation ForumTroll, used personalized phishing emails with short-lived links to deliver malware. Kaspersky detected the exploit, reported it to Google, and an update was released to fix the vulnerability (CVE-2025-2783). The campaign targeted media outlets, educational institutions, and government organizations in Russia, disguising itself as invitations to the 'Primakov Readings' forum. The attackers' goal appears to be espionage, and the sophistication of the malware suggests a state-sponsored APT group is behind the operation. The exploit chain involved sandbox escape and remote code execution, though only the former was fully analyzed.
Tags
Date
- Created: March 25, 2025, 11:09 p.m.
- Published: March 25, 2025, 11:09 p.m.
- Modified: March 26, 2025, 1:20 p.m.
Attack Patterns
- Trojan.Win64.Convagent.gen
- Trojan.Win64.Agent
- ForumTroll
- T1012
- T1573
- T1203
- T1082
- T1057
- T1083
- T1071
- T1569
- T1132
- T1027
- T1001
- T1566
- T1190
- T1078
- T1068
- T1059
Additional Informations
- Media
- Education
- Government
- Russian Federation