Cyber Security News

Operation ForumTroll – APT Hackers Exploit Google Chrome Zero-Day To Bypass Sandbox Protections

In mid-March 2025, cybersecurity researchers uncovered “Operation ForumTroll,” targeting Russian media outlets and educational institutions.

Victims are infected by clicking phishing links disguised as invitations to the “Primakov Readings” forum, requiring no further interaction for the sophisticated malware to deploy on vulnerable systems.

The campaign exploits a critical zero-day vulnerability (CVE-2025-2783) in Chrome that bypasses sandbox protections through a logical error at the Chrome-Windows interface, creating a significant security risk for users worldwide.

The exploit chain demonstrates advanced knowledge of browser security architecture and operating system interactions.

K7 Security Labs researchers identified this as a sophisticated state-sponsored APT operation focused on espionage activities.

They noted the phishing links were carefully personalized for each target and remained active only briefly to evade detection systems and security monitoring, indicating meticulous operational security.

Google responded quickly, patching the vulnerability on March 25 in Chrome versions 134.0.6998.177/.178 following detailed security reports from multiple research teams who identified the attack independently in different target environments.

Infection Mechanism

The advanced two-stage attack first exploits CVE-2025-2783 to escape Chrome’s sandbox, then deploys a second exploit enabling remote code execution with system-level privileges.

The infrastructure uses primakovreadings[.]info, now redirecting to the legitimate forum site.

Security researchers describe the vulnerability as particularly dangerous because it allows attackers to bypass Chrome’s sandbox “as if it didn’t exist,” effectively eliminating a critical browser security layer.

Technical analysis reveals the malware establishes persistence through registry modifications and scheduled tasks, while maintaining encrypted command-and-control communications using custom obfuscation techniques.

Malicious email (Source – Securelist)

The payload exfiltrates sensitive documents, browser credentials, and email correspondence through a series of encrypted data transfers.

Security products detect components as Exploit.Win32.Generic, Trojan.Win64.Agent, and Trojan.Win64.Convagent.gen.

Organizations should update Chrome immediately, implement email filtering systems, and monitor network traffic for suspicious connections to prevent compromise.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Tushar Subhra Dutta

Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

The CISO’s Guide to Managing Cyber Risk in Hybrid Workplaces

Hybrid work has become a permanent fixture in the modern enterprise, blending remote and in-office…

4 minutes ago

UK Retailer Co-op Shuts Down IT Systems After Cyber Attack Attempt

The Co-operative Group, one of the UK’s largest retailers, has been forced to shut down…

14 minutes ago

Ascension Healthcare Hacked via Third-party Business Partner: Patient Data Exposed

Ascension Healthcare, one of the largest private healthcare systems in the United States, has disclosed…

37 minutes ago

SonicWALL Connect Tunnel Vulnerability Allows Attackers to Create a DoS Condition

A significant security vulnerability has been identified in the SonicWall Connect Tunnel Windows Client, affecting…

45 minutes ago

OpenAI Rolled Out Last Week’s GPT-4o Update Causing Flattering Issues

OpenAI has reversed last week's update to its GPT-4o model after users reported the AI…

56 minutes ago

Konni APT Hackers Using Multi-Stage Malware to Attack Organizations

A sophisticated multi-stage malware campaign linked to the North Korean Konni APT group has been…

1 hour ago