Summary:On Tuesday, Google addressed a zero-day vulnerability in its Chrome browser that had been actively exploited in attacks. Tracked as CVE-2025-2783, the vulnerability stems from an “incorrect handle provided in unspecified circumstances in Mojo on Windows.” Kaspersky researchers, who identified and reported the flaw to Google, revealed that CVE-2025-2783 has been used by threat actors to bypass Chrome’s sandbox protections and deploy sophisticated malware. This vulnerability is primarily being exploited in phishing campaigns targeting media outlets and educational institutions in Russia. In the attack observed by Kaspersky, the infection begins with an email containing a seemingly legitimate invitation from the organizers of the “Primakov Readings,” a scientific and expert forum. Clicking the invitation link triggers the exploit, allowing attackers to escape the browser’s sandbox and infect the victim’s system with malware.
Security Officer Comments:According to Kaspersky, the links embedded in the phishing emails were personalized and designed to have a very short lifespan, enhancing their effectiveness and reducing the likelihood of detection. In this case, these links no longer trigger the exploit and simply redirect visitors to the official "Primakov Readings" website.
While Kaspersky didn’t clearly specify the type of malware deployed in this campaign. However, based on the detections provided by Kaspersky in its advisory, the malware likely enables actors to gain unauthorized access to systems, exfiltrate data, and potentially install additional malicious payloads for long-term control.
Suggested Corrections:The exploit identified by Kaspersky was designed to work alongside another exploit that enables remote code execution. Unfortunately, Kaspersky was unable to obtain this second exploit, as it would have required waiting for a new wave of attacks, potentially exposing users to further infection. Fortunately, the vulnerability used to bypass the Chrome sandbox has been patched in
Chrome version 134.0.6998.177/.178 for Windows, effectively blocking the entire attack chain.
Link(s):https://www.bleepingcomputer.com/ne...ome-zero-day-exploited-in-espionage-campaign/