Hacking Team Successor Memento Labs Linked to Chrome Zero-Day and 'Dante' Spyware

Kaspersky Links Memento Labs, Successor to Hacking Team, to 'Dante' Spyware and Chrome Zero-Day Campaign

CRITICAL
October 28, 2025
6m read
Threat ActorMalwareVulnerability

Related Entities

Organizations

Products & Tech

Google Chrome

Other

Memento LabsHacking TeamDanteLeetAgent

CVE Identifiers

Full Report

Executive Summary

On October 27, 2025, Kaspersky researchers revealed a direct link between Memento Labs, the successor to the infamous spyware vendor Hacking Team, and a sophisticated cyber-espionage campaign named "Operation ForumTroll." This campaign utilized a Google Chrome zero-day vulnerability, CVE-2025-2783, to deploy a commercial spyware implant known as "Dante." The operation targeted individuals in government, media, and finance in Russia and Belarus with drive-by-compromise attacks. The connection was established through code similarities between the new Dante spyware and Hacking Team's legacy Remote Control System (RCS) malware. This discovery highlights the resurgence of government-grade surveillance tools in the hands of commercial vendors and their use in targeted espionage operations.

Threat Overview

"Operation ForumTroll" was a highly targeted campaign that began with spearphishing emails containing short-lived links. The lures impersonated invitations to a legitimate political forum. Victims who clicked the link using a vulnerable version of Google Chrome were compromised without any further interaction.

The attack leveraged CVE-2025-2783, a zero-day vulnerability in Chrome, to escape the browser's sandbox and execute code on the victim's machine. The initial payload was a malware loader named LeetAgent, which in some cases was used to deploy the more powerful "Dante" spyware.

The Dante spyware is a modular, commercial-grade surveillance tool featuring advanced anti-analysis techniques like VMProtect obfuscation. Its code structure and functionalities bear a strong resemblance to the RCS spyware developed by Hacking Team, which was dismantled after a major breach in 2015. Memento Labs was formed from the remnants of Hacking Team in 2019, and its CEO later confirmed ownership of the Dante spyware.

Technical Analysis

The attack chain for Operation ForumTroll was as follows:

  1. Initial Access (T1566.002 - Spearphishing Link): Targets received personalized emails with a link to a malicious website.
  2. Exploitation (T1189 - Drive-by Compromise): When the victim visited the site, the exploit for CVE-2025-2783 was triggered, allowing the attacker to bypass Chrome's security features.
  3. Execution & Persistence: The exploit led to the execution of the LeetAgent loader, which established persistence on the compromised system.
  4. Payload Deployment (T1105 - Ingress Tool Transfer): LeetAgent then downloaded and installed the full "Dante" spyware suite.

The Dante spyware itself is highly sophisticated, designed for long-term espionage with capabilities for collecting data, recording communications, and avoiding detection.

Impact Assessment

The use of a commercial spyware platform like Dante in conjunction with a zero-day exploit represents a significant threat.

  • High-Level Espionage: The campaign targeted sensitive sectors like government, media, and finance, indicating a focus on gathering political and economic intelligence.
  • Erosion of Trust: The involvement of a commercial vendor in selling such powerful tools lowers the barrier to entry for nation-states to conduct sophisticated cyber-espionage.
  • Risk to Dissidents and Journalists: While this campaign targeted specific countries, commercial spyware is notoriously used by authoritarian regimes to target journalists, activists, and political opponents.
  • Zero-Day Exploitation: The use of a zero-day demonstrates the resources available to these actors and the inherent risk to users even of fully patched browsers (at the time of the attack).

Detection & Response

D3FEND Technique: Detecting a zero-day exploit is extremely difficult. Post-compromise detection would rely on endpoint monitoring via D3-PA - Process Analysis and D3-NTA - Network Traffic Analysis.

  • Endpoint Monitoring: Deploy EDR solutions to monitor for suspicious process behavior, such as a browser process spawning unexpected child processes (e.g., cmd.exe or powershell.exe).
  • Network Analysis: Look for network connections from endpoints to unknown C2 servers. The LeetAgent and Dante implants would need to communicate with their controllers.
  • Threat Intelligence: Use threat intelligence to obtain IOCs (IP addresses, domains, file hashes) associated with Operation ForumTroll and the Dante spyware and add them to blocklists.
  • Memory Analysis: For high-value targets, perform memory forensics to look for signs of fileless malware or injected code that may not be present on disk.

Mitigation

D3FEND Countermeasure: The primary defense against zero-day browser exploits is rapid patching (D3-SU - Software Update).

  • Browser Updates: The most critical mitigation is to ensure all browsers are kept up-to-date. Enable automatic updates to apply security patches as soon as they are released by the vendor.
  • Endpoint Hardening: Use security features like Attack Surface Reduction (ASR) rules on Windows to block browser processes from creating child processes.
  • Restrict Web-Based Content: Use web filters to block access to uncategorized or newly registered domains, which are often used in phishing campaigns.
  • User Training: While this attack involved a zero-click exploit after the initial click, training users to be suspicious of unsolicited emails with links remains a fundamental defense.

Timeline of Events

1
March 1, 2025
Kaspersky first detects the 'Operation ForumTroll' campaign.
2
October 27, 2025
Kaspersky publishes its findings linking the campaign to Memento Labs and the 'Dante' spyware.
3
October 28, 2025
This article was published

MITRE ATT&CK Mitigations

Keep web browsers and all other software updated to ensure patches for zero-day vulnerabilities are applied as quickly as possible.

Mapped D3FEND Techniques:

Utilize browser and operating system-level exploit protection features, such as sandboxing and memory protection, to make exploitation more difficult.

Mapped D3FEND Techniques:

Use web filtering to block access to uncategorized and known-malicious domains used to host exploits.

Mapped D3FEND Techniques:

Sources & References

Mem3nt0 mori – The Hacking Team is back!
Securelist (securelist.com) October 27, 2025
Chrome Zero-Day Exploitation Linked to Hacking Team Spyware
SecurityWeek (securityweek.com) October 27, 2025
Memento Labs Spyware Used in Chrome Zero-Day Campaign
Admin By Request (adminbyrequest.com) October 28, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

spywarezero-dayHacking TeamMemento LabsGoogle Chromeespionage

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading