By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Italian spyware vendor linked to Chrome zero-day attacks
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Italian spyware vendor linked to Chrome zero-day attacks
Tech News

Italian spyware vendor linked to Chrome zero-day attacks

By admin 5 Min Read
Share
SHARE

A zero-day vulnerability in Google Chrome, exploited in Operation ForumTroll earlier this year, delivered malware linked to Italian spyware vendor Memento Labs, born after IntheCyber ​​Group acquired the infamous Hacking Team.

Operation ForumTroll was uncovered by Kaspersky in March. The campaign targeted Russian organizations – media outlets, universities, research centers, government organizations, and financial institutions, with well-crafted invitations to the Primakov Readings forum that contained a malicious link.

Loading the link in any Chromium-based web browser was enough to infect the computer system. Kaspersky researchers said that the malware delivery was done by exploiting CVE-2025-2783, a sandbox escape zero-day in the Chrome browser.

Sample email from the ForumTroll attacks
<strong>Sample email from the ForumTroll attacks</strong><br /><em>Source: Kaspersky</em>

In a report today, Kaspersky published more details about the attack chain used in Operation ForumTroll, saying that the malware used in the campaign dates back to at least 2022 and led to the discovery of other attacks on organizations in Russia and Belarus.

Analyzing the old attacks, the researchers found “an unknown piece of malware that we identified as commercial spyware called “Dante” and developed by the Italian company Memento Labs.”

Memento Labs is the name of a new company built on the research and expertise of the former ‘Hacking Team,’ a Milan-based spyware vendor previously known for its Remote Control System (RCS) sold to authorities as a surveillance tool.

Hacking Team was breached in 2015, and the incident sealed the company’s fate as it revealed sales to authoritarian regimes, access to zero-day exploits, and interaction with government intelligence clients.

In 2019, the firm was acquired by InTheCyber Group, which used Hacking Team’s assets to form Memento Labs.

Four years later, at the ISS World Middle East and Africa conference, Memento Labs presented its new Dante spyware, although the details remained private.

LeetAgent and Dante

Operation ForumTroll attacks start with a phishing email with a personalized, short-lived link to the malicious site, where a validator script filters visitors to make sure that only targets of interest are compromised.

On the next step, the attackers exploited CVE-2025-2783 to achieve shellcode execution on the victim’s browser process and install a persistent loader to inject a malicious DLL.

The DLL decrypted the main payload called LeetAgent, a modular spyware that supports command execution, file operations, keylogging, and data theft.

Kaspersky researchers note that LeetAgent is unique for its use of leetspeak in command implementation, and believe that it might also be a commercial spyware tool.

Operation ForumTroll attack chain
<strong>Operation ForumTroll attack chain</strong><br /><em>Source: Kaspersky</em>

The researchers traced the use of LeetAgent to the attacks in 2022 against targets in Russia and Belarus. In some cases, LeetAgent was used to introduce Dante.

Due to Dante’s code similarities with Hacking Team’s RCS malware, Kaspersky researchers have high confidence in attributing the tools to Memento Labs.

Dante is a modular spyware that retrieves components from a command-and-control (C2) server. If no communication is received from the attacker’s server for a specified number of days, the malware “deletes itself and all traces of its activity.”

The researchers could not retrieve any modules for analysis, so the specific features and capabilities of the Dante spyware remain undocumented.

It is important to note that while Kaspersky attributed the advanced spyware to Memento Labs with high confidence, the author of the Chrome sandbox-escape zero-day could be a different entity.

Chrome fixed CVE-2025-2783 in version 134.0.6998.178, released on March 26. Mozilla also addressed the issue in Firefox, tracked as CVE-2025-2857, in version 136.0.4 of the browser.

BleepingComputer has contacted Memento Labs with a request for a comment on Kaspersky’s findings, but did not receive a response by publishing time.

Picus Blue Report 2025

46% of environments had passwords cracked, nearly doubling from 25% last year.

Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.

You Might Also Like

SETU gets new €11.5m IBM system to boost skill development

Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation

Everyone at the Musk v. Altman Trial Is Using Fancy Butt Cushions

The OAuth & MCP Investigation Checklist

Samsung Galaxy Z Fold 8 Wide Camera Spec Leak

TAGGED: Dante, Google Chrome, Memento Labs, Russia, spyware, Vulnerability, Zero-Day
Share This Article
Facebook Twitter Copy Link
Previous Article Buffalo’s Ed Oliver is out indefinitely after tearing his bicep in Week 8
Next Article Guide to Creating Responsive Apps with Figma Make AI in 2025
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

America’s data centers are thirsty. Rural towns are paying the price—from tanked water pressure to stolen desert groundwater
Business
Bitcoin rebounds slightly above $81k amid institutional caution
Crypto
Trump–Xi Summit Shifts Focus to Iran as Strait of Hormuz Tensions Escalate: Insiders
Politics
Nintendo’s Live-Action Zelda Movie Keeps Changing Release Dates
Gaming News
Canada is offering free access to its national parks this summer
Travel
Iran preparing for renewed war as military assets remain largely intact, reports warn
World News
America ‘Must Fight To Win Crypto’, Galaxy CEO Novogratz Says
Crypto

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

America’s data centers are thirsty. Rural towns are paying the price—from tanked water pressure to stolen desert groundwater

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
America’s data centers are thirsty. Rural towns are paying the price—from tanked water pressure to stolen desert groundwater
May 14, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?