A critical zero-day vulnerability in Google Chrome and other Chromium-based browsers, tracked as CVE-2025-2783, was exploited in the wild as part of a sophisticated espionage campaign. Research from Kaspersky attributes the campaign, named "Operation ForumTroll," to the Mem3nt0 mori APT group (also tracked as ForumTroll APT and TaxOff). Starting in March 2025, the attackers used highly targeted spear-phishing emails to lure victims into clicking a malicious link, which triggered the exploit and led to the deployment of the LeetAgent spyware. The spyware is reportedly developed by the Italian vendor Memento Labs. The campaign primarily targeted government, financial, research, and educational institutions in Russia and Belarus.
"Operation ForumTroll" is a classic example of a state-sponsored or state-aligned espionage operation, characterized by its use of a zero-day exploit, custom malware, and highly targeted social engineering.
Attack Chain:
T1566.002 - Phishing: Spearphishing Link).T1211 - Exploitation for Client Execution).The campaign successfully compromised multiple organizations within strategic sectors in Russia and Belarus. The primary impact is espionage and the theft of sensitive government, financial, and scientific information. The use of a commercial spyware tool like LeetAgent highlights the growing and controversial market for offensive cyber capabilities, where private companies develop and sell powerful hacking tools to government clients.
cmd.exe or powershell.exe.Promptly updating Google Chrome and other Chromium-based browsers is the most effective mitigation against CVE-2025-2783.
Training users to be skeptical of unsolicited emails and links, even if they appear personalized, helps prevent the initial compromise.
Using web filtering and email security gateways to block access to malicious links at time-of-click.
The primary and most critical defense against the exploitation of CVE-2025-2783 is to ensure all instances of Google Chrome and other Chromium-based browsers (like Microsoft Edge) are updated immediately. Organizations should enforce automatic updates via group policy or MDM solutions. Given that this was an actively exploited zero-day, a rapid, enterprise-wide patching cycle is essential to close the window of opportunity for the Mem3nt0 mori group and other actors who may adopt the exploit.
Since 'Operation ForumTroll' began with a highly personalized spear-phishing email, user training is a vital layer of defense. Employees, especially those in targeted regions (Russia, Belarus) and sectors (government, finance), must be trained to identify the hallmarks of sophisticated phishing. This includes scrutinizing sender addresses, being wary of unexpected invitations or links, and hovering over URLs to inspect their true destination before clicking. Regular, targeted phishing simulations that mimic APT tactics can help build resilience and a culture of healthy skepticism.
To detect post-exploitation activity, security teams should use an EDR to monitor browser process behavior. Specifically, create detection rules that alert when a browser process (e.g., chrome.exe) spawns unexpected child processes, such as powershell.exe, cmd.exe, or wscript.exe. In the context of this attack, it would also be valuable to monitor for the browser process writing new executables to disk (like LeetAgent.exe) or making network connections to IP addresses and domains not associated with normal web browsing. This behavioral analysis can catch the exploit chain even if the specific malware signatures are unknown.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats