On October 27, 2025, Kaspersky researchers revealed a direct link between Memento Labs, the successor to the infamous spyware vendor Hacking Team, and a sophisticated cyber-espionage campaign named "Operation ForumTroll." This campaign utilized a Google Chrome zero-day vulnerability, CVE-2025-2783, to deploy a commercial spyware implant known as "Dante." The operation targeted individuals in government, media, and finance in Russia and Belarus with drive-by-compromise attacks. The connection was established through code similarities between the new Dante spyware and Hacking Team's legacy Remote Control System (RCS) malware. This discovery highlights the resurgence of government-grade surveillance tools in the hands of commercial vendors and their use in targeted espionage operations.
"Operation ForumTroll" was a highly targeted campaign that began with spearphishing emails containing short-lived links. The lures impersonated invitations to a legitimate political forum. Victims who clicked the link using a vulnerable version of Google Chrome were compromised without any further interaction.
The attack leveraged CVE-2025-2783, a zero-day vulnerability in Chrome, to escape the browser's sandbox and execute code on the victim's machine. The initial payload was a malware loader named LeetAgent, which in some cases was used to deploy the more powerful "Dante" spyware.
The Dante spyware is a modular, commercial-grade surveillance tool featuring advanced anti-analysis techniques like VMProtect obfuscation. Its code structure and functionalities bear a strong resemblance to the RCS spyware developed by Hacking Team, which was dismantled after a major breach in 2015. Memento Labs was formed from the remnants of Hacking Team in 2019, and its CEO later confirmed ownership of the Dante spyware.
The attack chain for Operation ForumTroll was as follows:
T1566.002 - Spearphishing Link): Targets received personalized emails with a link to a malicious website.T1189 - Drive-by Compromise): When the victim visited the site, the exploit for CVE-2025-2783 was triggered, allowing the attacker to bypass Chrome's security features.LeetAgent loader, which established persistence on the compromised system.T1105 - Ingress Tool Transfer): LeetAgent then downloaded and installed the full "Dante" spyware suite.The Dante spyware itself is highly sophisticated, designed for long-term espionage with capabilities for collecting data, recording communications, and avoiding detection.
The use of a commercial spyware platform like Dante in conjunction with a zero-day exploit represents a significant threat.
D3FEND Technique: Detecting a zero-day exploit is extremely difficult. Post-compromise detection would rely on endpoint monitoring via
D3-PA - Process AnalysisandD3-NTA - Network Traffic Analysis.
cmd.exe or powershell.exe).LeetAgent and Dante implants would need to communicate with their controllers.D3FEND Countermeasure: The primary defense against zero-day browser exploits is rapid patching (
D3-SU - Software Update).
Keep web browsers and all other software updated to ensure patches for zero-day vulnerabilities are applied as quickly as possible.
Mapped D3FEND Techniques:
Utilize browser and operating system-level exploit protection features, such as sandboxing and memory protection, to make exploitation more difficult.
Mapped D3FEND Techniques:
Use web filtering to block access to uncategorized and known-malicious domains used to host exploits.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats