Chrome Zero-Day Chaos: Operation ForumTroll Unleashes LeetAgent Spyware in 2025!
In a plot twist worthy of a spy novel, Operation ForumTroll exploits Chrome zero-day CVE-2025-2783 to play cat-and-mouse with cybersecurity experts. Using phishing emails disguised as forum invites, it delivers malware with all the subtlety of a toddler’s dance recital, leaving organizations in Russia scrambling for digital cover.

Hot Take:
In a classic case of life imitating a bad spy movie, hackers are once again wreaking havoc with a shiny new Chrome zero-day exploit. This time, they’ve decided to gather intelligence through Operation ForumTroll, a campaign so sophisticated that James Bond himself might consider a career change. It’s like the bad guys have become tech-savvy and are using leetspeak in their attacks—who knew they could be so…leet? But seriously, if only these hackers would put their skills toward something more noble, like creating a self-cleaning house or a fridge that never runs out of snacks. Alas, here we are, dodging phishing emails like they’re the plague and checking our digital locks twice before bedtime.
Key Points:
- First Chrome zero-day exploit of 2025 connected to spyware from Hacking Team’s rebranded company, Memento Labs.
- Operation ForumTroll targets various sectors in Russia using phishing emails with exploit links.
- The spyware, LeetAgent, is skilled in keylogging, file theft, and executing commands via HTTPS.
- Memento Labs’ new tool, Dante, shares similarities with the older Da Vinci spyware but wasn’t used in this campaign.
- Fastly.net cloud infrastructure is the command-and-control base for the spyware communications.
