Google has released fixes outside the range to resolve high-speed security lack in its Chrome browser for Windows, which, he said, was used in the wild as part of the attacks aimed at organizations in Russia.
Vulnerability tracked as Cve-2025-2783It was described as a case of “the wrong handle provided in uncertain circumstances in Mojo on Windows”. Movy It turns to the collection of time of execution libraries that provide a platform-lady mechanism for interneculation (IPC).
As usual, Google has not disclosed the additional technical specificity about the nature of the attacks, the identity of the threats behind them and which may have been aimed at. The vulnerability was connected to the Chrome version 134.0.6998.177/178 for Windows.
“Google knows about the reports that there is a feat for the CVE-2025-2783 in the wild,” the technological giant admitted to the tough counseling.
It is worth noting that the CVE-2025-2783 is the first actively used chrome zero day since the beginning of the year. Researchers of Kaspersky Boris Larin and Igor Kuznetsova were enrolled in the opening and lack of March 2025.
The Russian cybersecurity supplier in its own ballot described the zero operation of the CVE-2025-2783 as a technically complex targeted attack, which indicates an advanced permanent threat (APT). This is a tracking activity called Forumtroll.
“In all cases the infection occurred immediately after – Note. “No further action is required for infection.”
“The essence of the vulnerability comes down to an error in the logic at crossing Chrome and Windows operating system, which allows to bypass the browser’s sandbox.
It is said that short -term links were personalized to the goals, and espionage was the ultimate goal of the company. Caspersky said that malicious emails contained invitations presumably organizers of the legal scientific and expert forum, Reading the addations.
Phishing -electronic letters are aimed at the media, educational institutions and state organizations in Russia. In addition, the CVE-2025-2783 is designed to launch in conjunction with additional operation that facilitates the remote code. Kaspersky said he could not get a second feat.
“All analyzed attacks of the attack still indicate the high refinement of the attackers, which allows us to confidently conclude that the state group of APT is behind this attack,” the researchers said.