Google fixes Chrome zero-day security flaw used in hacking campaign targeting journalists


Google Patches Critical Chrome Browser Vulnerability Exploited by Hackers

Technology giant Google has issued an urgent update to its Chrome browser for Windows operating systems, addressing a critical security vulnerability that was actively being exploited by malicious actors. This zero-day exploit allowed hackers to infiltrate targeted computers, highlighting the ongoing cybersecurity threats faced by internet users.

Discovery and Identification of the Security Flaw

In a brief announcement released on Tuesday, Google confirmed the successful remediation of the vulnerability, identified as CVE-2025-2783. The flaw was initially detected by cybersecurity researchers at Kaspersky, a prominent security firm, earlier this month.

Zero-Day Exploit “In the Wild”

Google acknowledged credible reports indicating that an active exploit leveraging this security bug was “in the wild,” meaning it was already being used in real-world attacks. The designation “zero-day” underscores the severity of the issue, as Google and other affected parties had no prior warning to develop a patch before it was actively weaponized.

Details of the Cyberattack Campaign

According to Kaspersky’s findings, the vulnerability was leveraged as part of a sophisticated cyberattack campaign specifically targeting Windows systems running the Chrome browser.

“Operation ForumTroll” Phishing Scheme

Kaspersky detailed the campaign, codenamed “Operation ForumTroll,” in a recent blog post. The attacks commenced with meticulously crafted phishing emails. These deceptive emails lured victims with an invitation to a fictitious Russian global political summit. Unsuspecting users who clicked aHyperlink embedded within the email were redirected to a malicious website. This website was engineered to automatically exploit the browser vulnerability, granting unauthorized access to the victim’s computer data.

Bypassing Chrome’s Sandbox Protections

At the time of the Chrome patch release, Kaspersky disclosed limited technical details about the specific nature of the security flaw. However, the firm confirmed that the bug allowed attackers to circumvent Chrome’s built-in sandbox protections. These sandbox mechanisms are designed to restrict a browser’s access to sensitive data residing on the user’s computer. Kaspersky further noted that this vulnerability extends its reach to all web browsers built upon Google’s Chromium engine, a widely adopted platform.

Espionage Motives and Targeted Victims

In a separate analysis of the cyberattack, Kaspersky suggested the campaign likely constituted an espionage operation. Such operations are typically characterized by covert surveillance and data exfiltration from a target’s device over an extended timeframe. The Russia-based security company revealed that the threat actors disseminated personalized phishing emails to individuals associated with Russian media outlets and employees of educational institutions.

Attribution Remains Unclear

While the identity of the perpetrators behind the exploit remains undetermined, Kaspersky attributed the “Operation ForumTroll” campaign to a group of hackers likely backed by a nation-state or government. This assessment points to a sophisticated and well-resourced threat actor.

Browser Security and the High Value of Zero-Day Exploits

Web browsers, like Chrome, are consistently attractive targets for both cybercriminals and state-sponsored hacking groups. Zero-day vulnerabilities that can breach browser defenses and compromise sensitive user data command substantial prices within the illicit market. Notably, in 2024, a zero-day exploit broker advertised bounties of up to $3 million for exploitable bugs that can be triggered remotely via the internet.

Chrome Update Rollout

Google has indicated that the necessary Chrome updates, containing the security patch, will be distributed to users in phases over the coming days and weeks. Users are strongly advised to ensure their Chrome browsers are updated to the latest version to mitigate potential risks associated with this now-resolved vulnerability.


🕐 Top News in the Last Hour By Importance Score

# Title 📊 i-Score
1 Israel admits mistakes over medic killings in Gaza 🟢 85 / 100
2 Disc golfer refuses to compete against transgender opponent, walks out of competition: ‘Females must be protected’ 🔴 75 / 100
3 Marjorie Taylor Greene makes huge stock market play just days before tariffs announced 🔴 72 / 100
4 Young men turn to private healthcare for prostate cancer screening as they are not eligible on the NHS 🔴 72 / 100
5 Meta releases Llama 4, a new crop of flagship AI models 🔴 72 / 100
6 ‘The White Lotus’ Luxury: How Branded Collaborations Are Capitalizing on Privilege 🔵 50 / 100
7 Apprentice levy is 'too restrictive', says Airbus 🔵 45 / 100
8 Study reveals what people love most about sex – and it's NOT orgasm 🔵 45 / 100
9 ‘A Minecraft Movie’ struck box office gold, debuting at No. 1 🔵 45 / 100
10 Australia election 2025 live: Dutton says he will cut 80,000 international students; Labor plans to cut home battery costs 🔵 45 / 100

View More Top News ➡️