Google has fixed a vulnerability in Chrome for Windows that attackers have already used to attack user computers. The vulnerability, registered as CVE-2025-2783, was discovered by Kaspersky Lab researchers earlier in the month and allowed hackers to bypass browser security mechanisms. The company confirmed that the exploit for this vulnerability was actively spreading online before the patch was released, classifying it as a zero-day vulnerability.
According to Kaspersky, the attacks took place as part of the Operation ForumTroll campaign. Victims received phishing emails inviting them to a Russian political forum. Clicking on a link from the email led to a malicious site that instantly exploited the vulnerability, giving attackers access to data on the device. The main targets were employees of Russian media and educational institutions.
The vulnerability allowed attackers to bypass Chrome's sandbox, limiting the browser's access to the system. This gave control over the device, including access to files and installed applications. Since the problem affects all Chromium-based browsers, including Microsoft Edge and Opera, experts recommended updating them as soon as possible.
Google has begun a phased rollout of the fix via Chrome automatic updates. The process will take several days or a week depending on the region. Users are advised to check their browser version in Help -> About Google Chrome and install update 123.0.6312.149/.150.
Zero-day vulnerabilities are associated with their high value on the black market. In 2024, brokers offered up to $3 million for exploits capable of remotely hacking devices. Such bugs are often used in targeted attacks on government agencies, activists, and journalists, making timely software updates critical. In the case of a zero-day, installing patches quickly remains the only reliable way to protect yourself.
The technological giant Google has just released an emergency security update for its Chrome browser to fix the first serious zero-day vulnerability discovered in 2025. Hacker groups have been exploiting a vulnerability identified as CVE-2025-2783 for attacks. A zero-day vulnerability is a term used to describe security vulnerabilities that have not yet been disclosed or patched. Hackers and cybercriminals exploit these vulnerabilities to break into enterprise and corporate computer systems to steal or alter data.
Google issued a security alert describing the severity of the vulnerability as extremely high. The vulnerability allows attackers to bypass Chrome's sandbox, which is a key step in installing malicious software and gaining control of the victim's computer. Google has integrated a fix for the CVE-2025-2783 vulnerability in Chrome version 134.0.6998.178.
Google is currently restricting the publication of technical details about the vulnerability to give users time to update and avoid its exploitation by hackers. Security researchers Boris Larin and Igor Kuznetsov from Kaspersky Lab discovered and reported the vulnerability. According to Kaspersky Lab, this vulnerability is a key link in a targeted attack called Operation ForumTroll.
The campaign used sophisticated phishing emails sent on behalf of organizers of the Primakov Readings scientific and expert forum. The purpose of these emails was to target mass media, educational institutions, and government agencies in Russia. When a user clicks on a malicious link in an email, they are redirected to a dangerous website where malicious software is activated.
According to Kaspersky, participants in Operation ForumTroll also used another vulnerability for remote code execution, but the fix for the Chrome CVE-2025-2783 vulnerability proved sufficient to disrupt the entire infection chain. According to Google, due to the active exploitation of the vulnerability, Google Chrome users, especially on Windows operating systems, are advised to urgently check and update their browser to version 134.0.6998.178 or later.