Google has released an urgent update for its Chrome browser to address a critical zero-day vulnerability, CVE-2025-2783, which has been actively exploited in targeted attacks against organizations in Russia. This vulnerability allows attackers to bypass Chrome’s sandbox protections, posing significant risks to users.

Key Takeaways
Vulnerability Identified: CVE-2025-2783 allows for sandbox escape in Chrome.
Targeted Attacks: Exploits were part of a campaign dubbed "Operation ForumTroll.
Immediate Action Required: Users are urged to update to version 134.0.6998.177.
Espionage Focus: The attacks primarily targeted media, educational, and government entities in Russia.
Overview of the Vulnerability
The vulnerability, tracked as CVE-2025-2783, was reported by Kaspersky researchers on March 20, 2025. It involves an incorrect handle provided in unspecified circumstances within the Mojo framework on Windows. This flaw has been exploited in real-world attacks, allowing attackers to execute malicious code without user intervention.
Exploit Details
The exploitation of CVE-2025-2783 was observed in a series of highly targeted phishing campaigns. Key characteristics include:
Phishing Campaigns: Dubbed "Operation ForumTroll," these campaigns utilized personalized malicious links.
Immediate Infection: Victims were infected simply by clicking on a link in a phishing email, which opened in Chrome without further action.
Malware Sophistication: The malware was designed to work alongside another exploit for remote code execution, although details of the second exploit remain undisclosed due to security concerns.
Targeted Entities
Kaspersky's analysis indicates that the primary goal of these attacks was espionage, specifically targeting:
Media Outlets
Educational Institutions
Government Organizations
The sophistication of the malware and tactics suggests involvement by a state-sponsored Advanced Persistent Threat (APT) group.
Google’s Response
In response to the active exploitation of this vulnerability, Google has rolled out version 134.0.6998.177 for Windows. Users are strongly advised to update their browsers as soon as possible to mitigate potential risks. The update will be gradually available over the coming days.
Importance of Timely Updates
This incident underscores the critical importance of prompt security patches and collaboration between tech companies and cybersecurity researchers. As cyber threats continue to evolve, maintaining up-to-date software is essential for both individual and organizational cybersecurity.
The release of this patch highlights the ongoing battle against cyber threats, particularly those linked to state-sponsored actors. Users of Chromium-based browsers, including Microsoft Edge, Brave, Opera, and Vivaldi, should also be vigilant and apply updates as they become available. Staying informed and proactive is key to safeguarding against such sophisticated attacks.
As cybercriminals continue to adapt their strategies, awareness and education remain crucial in combating these threats. Cybersecurity is critical. BetterWorld Technology offers cutting-edge solutions to combat evolving threats while driving innovation. Protect your business with confidence—contact us today for a consultation!
Sources
Google Chrome Zero-Day Vulnerability Actively Exploited in the Wild, GBHackers News.
Google fixes fifth actively exploited Chrome zero-day this year, Security Affairs.
Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks, The Hacker News.