- Google Chrome corrected its first zero-day defect of the year
- The bug allowed cyber-spying, mainly against targets in Russia
- Kaspersky researchers thanked for finding a bug, and users have said to update now
Google has set a vulnerability with high zero-day severity in its chrome browser which was exploited in the wild.
In a security notice, the company described the bug as an “incorrect handle provided in unpertified circumstances in Mojo on Windows”.
The defect is followed as CVE-2’25-2783, and he has not yet received a gravity score. Google lists him as “raised” in his opinion. It was corrected with version 134.0.6998,178 which has already been deployed, so be sure to check if you have already received it.
Operating Forum
The company has not detailed who are the attackers or the victims, and simply declared that it would restrict access to the details of the bugs and the links until the majority of users update their browsers. However, he thanked two researchers from Kaspersky – Boris Larin and Igor Kuznetsov, for discovering the fault.
In a separate report, Kaspersky said that vulnerability was used to escape the browser sandbox and deploy malware against targets in Russia.
The researchers spotted it during the study of a “peak in infections” from a malicious strain previously unknown, cyberinider reported.
The campaign involves phishing, redirecting victims to Primakovreadings[dot]Info. The whole campaign was nicknamed the Forumtroll operation and, apparently, the objective is to lead a cyber-spying.
Kaspersky also said that Forumtroll operational attackers also used a separate vulnerability to allow the execution of the remote code to compromise termination points. However, the chrome fault patch breaks the entire infection chain.
“Although research is still underway, but judging by the functionality of sophisticated malicious software used in the attack, Kaspersky says that the attacker’s goal was probably espionage,” Kaspersky said.
“The malicious emails contained supposed invitations of the organizers of a scientific and expert forum,” Primakov readings “, targeting the media, educational establishments and government organizations in Russia. On the basis of the content of emails, we have nicknamed the campaign operation.”