Chrome Zero-Day Exploit Fixed by Google - Journalist Hack

Google Patches Chrome Zero-Day Vulnerability
Google has announced the resolution of a security flaw within its Chrome browser for Windows operating systems. This vulnerability had been actively exploited by malicious actors to compromise user systems.
Details of the Vulnerability
The vulnerability, identified as CVE-2025-2783, was initially discovered by security researchers at Kaspersky earlier in the month. Google confirmed the fix in a statement released on Tuesday.
The company acknowledged reports indicating the existence of a working exploit "in the wild." This designation as a zero-day vulnerability signifies that Google received no prior warning or opportunity to address the flaw before its exploitation began.
Operation ForumTroll: The Hacking Campaign
According to Kaspersky’s analysis, the vulnerability was leveraged as part of a targeted hacking operation dubbed “Operation ForumTroll.” This campaign specifically focused on Windows computers utilizing the Chrome browser.
Victims were initially contacted through phishing emails. These emails contained invitations to a global political summit held in Russia. Clicking the embedded link redirected users to a malicious website.
Upon accessing this website, the vulnerability was immediately exploited, granting attackers access to sensitive data residing on the victim’s computer.
Bypassing Security Protections
While initial details were limited, Kaspersky clarified that the flaw allowed attackers to circumvent Chrome’s sandbox protections. These protections are designed to restrict the browser’s access to other data on the user’s system.
Furthermore, Kaspersky indicated that the vulnerability extends to other browsers built upon Google’s Chromium engine.
Espionage and Targeted Attacks
Kaspersky’s subsequent analysis suggests the vulnerability was likely employed in an espionage campaign. Such campaigns are typically characterized by the covert monitoring and theft of data from targeted devices over extended periods.
The security firm reported that personalized phishing emails were dispatched to Russian media representatives and personnel within educational institutions.
Attribution and Financial Incentives
The identity of the exploiters remains unclear, though Kaspersky attributes the campaign to a potentially state-sponsored or government-backed hacking group.
Web browsers, including Chrome, are frequently targeted by malicious actors and state-sponsored groups. Zero-day vulnerabilities capable of breaching security measures and accessing sensitive data command substantial prices on the black market.
In 2024, a zero-day broker offered as much as $3 million for exploitable bugs that could be triggered remotely.
Chrome Updates and Mitigation
Google has stated that Chrome updates containing the fix will be rolled out over the coming days and weeks. Users are encouraged to ensure their browsers are updated to the latest version to mitigate the risk of exploitation.
Related Posts

Coupang CEO Resigns After Data Breach | South Korea

Petco Vetco Data Breach: Customer Information Exposed

FTC Upholds Ban on Stalkerware Founder Scott Zuckerman

Google Details Chrome Security for Agentic Features

Petco Data Breach: SSNs, Driver's Licenses Exposed
