On October 27, 2025, Kaspersky researchers revealed a direct link between Memento Labs, the successor to the infamous spyware vendor Hacking Team, and a sophisticated cyber-espionage campaign named "Operation ForumTroll." This campaign utilized a Google Chrome zero-day vulnerability, CVE-2025-2783, to deploy a commercial spyware implant known as "Dante." The operation targeted individuals in government, media, and finance in Russia and Belarus with drive-by-compromise attacks. The connection was established through code similarities between the new Dante spyware and Hacking Team's legacy Remote Control System (RCS) malware. This discovery highlights the resurgence of government-grade surveillance tools in the hands of commercial vendors and their use in targeted espionage operations.
"Operation ForumTroll" was a highly targeted campaign that began with spearphishing emails containing short-lived links. The lures impersonated invitations to a legitimate political forum. Victims who clicked the link using a vulnerable version of Google Chrome were compromised without any further interaction.
The attack leveraged CVE-2025-2783, a zero-day vulnerability in Chrome, to escape the browser's sandbox and execute code on the victim's machine. The initial payload was a malware loader named LeetAgent, which in some cases was used to deploy the more powerful "Dante" spyware.
The Dante spyware is a modular, commercial-grade surveillance tool featuring advanced anti-analysis techniques like VMProtect obfuscation. Its code structure and functionalities bear a strong resemblance to the RCS spyware developed by Hacking Team, which was dismantled after a major breach in 2015. Memento Labs was formed from the remnants of Hacking Team in 2019, and its CEO later confirmed ownership of the Dante spyware.
The attack chain for Operation ForumTroll was as follows:
T1566.002 - Spearphishing Link): Targets received personalized emails with a link to a malicious website.T1189 - Drive-by Compromise): When the victim visited the site, the exploit for CVE-2025-2783 was triggered, allowing the attacker to bypass Chrome's security features.LeetAgent loader, which established persistence on the compromised system.T1105 - Ingress Tool Transfer): LeetAgent then downloaded and installed the full "Dante" spyware suite.The Dante spyware itself is highly sophisticated, designed for long-term espionage with capabilities for collecting data, recording communications, and avoiding detection.
The use of a commercial spyware platform like Dante in conjunction with a zero-day exploit represents a significant threat.
D3FEND Technique: Detecting a zero-day exploit is extremely difficult. Post-compromise detection would rely on endpoint monitoring via
D3-PA - Process AnalysisandD3-NTA - Network Traffic Analysis.
cmd.exe or powershell.exe).LeetAgent and Dante implants would need to communicate with their controllers.D3FEND Countermeasure: The primary defense against zero-day browser exploits is rapid patching (
D3-SU - Software Update).
Keep web browsers and all other software updated to ensure patches for zero-day vulnerabilities are applied as quickly as possible.
Mapped D3FEND Techniques:
Utilize browser and operating system-level exploit protection features, such as sandboxing and memory protection, to make exploitation more difficult.
Mapped D3FEND Techniques:
Use web filtering to block access to uncategorized and known-malicious domains used to host exploits.
Mapped D3FEND Techniques:
Kaspersky first detects the 'Operation ForumTroll' campaign.
Kaspersky publishes its findings linking the campaign to Memento Labs and the 'Dante' spyware.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.