卡巴斯基披露 Chrome 零日漏洞(CVE-2025-2783)与 ForumTroll 活动中的 Memento Labs 间谍软件
嗯,用户让我用中文帮他总结一下这篇文章,控制在100字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述。首先,我需要通读整篇文章,抓住主要信息。 文章讲的是Kaspersky的研究人员发现了一个复杂的间谍活动,利用了Google Chrome的一个零日漏洞,投放了间谍软件。这个间谍软件和意大利公司Memento Labs有关。活动被称为Operation ForumTroll,他们通过钓鱼邮件邀请受害者参加一个俄罗斯的科学论坛。访问恶意网站就会感染。 然后,钓鱼邮件是用俄语写的,目标是俄罗斯的各种机构。邮件里有独特的短链接。Kaspersky发现了Chrome的一个零日漏洞,已经被修复了。攻击链包括多阶段加载器,使用WebGPU API验证人类访问者,持久化使用COM hijacking技术。最后的间谍软件叫LeetAgent,能远程控制、键盘记录、窃取文件。Kaspersky还发现这个间谍软件和Memento Labs的Dante有关。 所以总结的时候要包括:Kaspersky发现的间谍活动、利用Chrome零日漏洞、投放Memento Labs的Dante间谍软件、钓鱼邮件伪装成科学论坛邀请、攻击目标主要是俄罗斯和白俄罗斯的机构。 现在要把这些信息浓缩到100字以内,确保涵盖主要点:研究人员、活动名称、利用零日漏洞、投放间谍软件、钓鱼邮件内容、攻击目标和影响。 可能的结构:研究人员发现间谍活动利用Chrome漏洞投放Dante间谍软件,钓鱼邮件伪装论坛邀请感染受害者,目标主要是俄罗斯机构。 检查字数是否在限制内,并确保流畅自然。 </think> 卡巴斯基研究人员发现一起利用Google Chrome零日漏洞的复杂间谍活动,该活动通过伪装成科学论坛邀请的钓鱼邮件感染受害者,并部署名为Dante的商业间谍软件。攻击主要针对俄罗斯和白俄罗斯的政府机构及组织。 2025-10-28 02:54:31 Author: securityonline.info(查看原文) 阅读量:0 收藏

spyware

Researchers at Kaspersky uncovered a sophisticated espionage campaign exploiting a zero-day vulnerability in Google Chrome and delivering commercial spyware linked to the Italian company Memento Labs — formerly known as Hacking Team.

Dubbed Operation ForumTroll, the campaign began with personalized phishing emails that invited recipients to the Primakov Readings, a well-known Russian scientific forum. Simply visiting the malicious website was enough to infect the victim. As Kaspersky explains, “No further action was required to initiate the infection; simply visiting the malicious website using Google Chrome or another Chromium-based web browser was enough.”

The phishing emails were meticulously crafted and written in authentic Russian, targeting media outlets, universities, research centers, financial institutions, and government organizations across Russia. Each email contained a unique, short-lived phishing link designed to bypass detection.

According to Kaspersky, “The malicious emails sent by the attackers were disguised as invitations from the organizers of the Primakov Readings scientific and expert forum. These emails contained personalized links to track infections.”

The campaign’s professionalism and language proficiency suggest regional expertise, though “mistakes in some cases suggest that the attackers were not native Russian speakers,” the report notes — a sign of deliberate masquerade.

Chrome Zero-Day RCE, Memento Labs Spyware
Operation ForumTroll attack chain | Image: Kaspersky

Kaspersky’s investigation revealed a previously unknown Chrome zero-day (CVE-2025-2783) that allowed the attackers to escape Chrome’s sandbox using an obscure Windows API flaw.

The exploit abused pseudo-handles such as -2 returned by GetCurrentThread(), which were not properly validated by Chrome’s interprocess communication (IPC) mechanisms. This logical oversight enabled attackers to escalate privileges from a sandboxed renderer to the browser process.

As Kaspersky describes, “This exploit genuinely puzzled us because it allowed attackers to bypass Google Chrome’s sandbox protection without performing any obviously malicious or prohibited actions. This was due to a powerful logical vulnerability caused by an obscure quirk in the Windows OS.”

The vulnerability has since been patched in Chrome 134.0.6998.177/.178, with the fix credited to Kaspersky. Interestingly, Mozilla later discovered a similar issue, releasing CVE-2025-2857 for Firefox.

Kaspersky notes, “When pseudo handles were first introduced, they simplified development and helped squeeze out extra performance… Now, decades later, that outdated optimization has come back to bite us.”

After exploiting the browser, the attackers deployed a multi-stage loader chain beginning with a “validator” script that used the WebGPU API to verify human visitors. This validator performed elliptic-curve key exchange (ECDH) and decrypted the next payload hidden in fake JavaScript and font files.

Persistence was established using COM hijacking, a technique that overrides legitimate CLSID registry entries to execute malicious DLLs. The loader decrypted the final payload only when running within specific system processes, increasing stealth.

Kaspersky explains, “The attackers used this technique to override the CLSID of twinapi.dll and cause system processes and web browsers to load the malicious DLL.”

The decrypted payload, named LeetAgent, acted as the spyware component of the campaign. Its command identifiers were humorously written in leetspeak — such as 0x6177 (KILL) and 0xF17E09 (FILE) — giving the malware its name.

LeetAgent executed remote commands, performed keylogging, and exfiltrated sensitive documents with extensions like .doc, .xls, .pdf, and .pptx. Communication with command-and-control (C2) servers occurred via HTTPS with obfuscation layers, often leveraging Fastly’s CDN infrastructure.

In a major revelation, Kaspersky traced the campaign’s secondary payloads to Dante, a commercial spyware product developed by Memento Labs, the rebranded successor of Hacking Team.

The analysts wrote, “After analyzing this previously unknown, sophisticated spyware, we were able to identify it as commercial spyware called Dante, developed by the Italian company Memento Labs.”

Like Hacking Team’s infamous Remote Control Systems (RCS) spyware, Dante is engineered for covert surveillance, featuring VMProtect packing, anti-debugging, anti-sandbox checks, and modular architecture. It decrypts its configuration data using XOR and AES-256-CBC, with the encryption key bound to the victim machine’s hardware ID.

Kaspersky points out, “Why did the authors name it Dante? This may be a nod to tradition, as RCS spyware was also known as ‘Da Vinci’. But it could also be a reference to Dante’s Divine Comedy, alluding to the many ‘circles of hell’ that malware analysts must pass through when detecting and analyzing the spyware.”

Through overlapping infrastructure, persistence methods, and code similarities, Kaspersky linked LeetAgent and Dante to the same ForumTroll APT group. The company observed similar attacks dating back to 2022, primarily targeting entities in Russia and Belarus.

While the attackers demonstrated strong regional awareness, Kaspersky’s linguistic and infrastructure analysis suggests foreign actors using commercial spyware as part of a state-aligned or mercenary espionage operation.

Related Posts:


文章来源: https://securityonline.info/kaspersky-exposes-chrome-zero-day-rce-cve-2025-2783-delivering-memento-labs-spyware-in-forumtroll-campaign/
如有侵权请联系:admin#unsafe.sh