TechCrunch News 03月26日 21:22
Google fixes Chrome zero-day security flaw used in hacking campaign targeting journalists
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

谷歌修复了Windows版Chrome浏览器的一个漏洞,该漏洞被黑客利用入侵用户电脑。此漏洞由卡巴斯基发现,黑客通过钓鱼邮件诱导用户点击链接,利用该漏洞获取用户PC数据。谷歌表示更新将在未来几天或几周内推出。

💻谷歌修复Windows版Chrome漏洞CVE-2025-2783

🎯黑客利用漏洞进行攻击,通过钓鱼邮件诱导用户

🛡漏洞可绕过Chrome沙盒保护,影响基于Chromium引擎的浏览器

📅谷歌Chrome更新将在未来几天或几周内推出

Google said it has fixed a vulnerability in its Chrome browser for Windows that malicious hackers have used to break into victims’ computers.

In a brief note on Tuesday, Google said that it fixed the vulnerability, tracked as CVE-2025-2783, that was discovered by researchers at security firm Kaspersky earlier this month. 

Google said it was aware of reports that an exploit for the bug “exists in the wild.” The bug is referred to as a zero-day because the vendor — in this case, Google — was given no time to fix the bug before it was exploited.

According to Kaspersky, the bug was exploited as part of a hacking campaign targeting Windows computers running Chrome. 

In a blog post, Kaspersky called the campaign “Operation ForumTroll,” and said victims were targeted with a phishing email inviting them to a Russian global political summit. When a link in the email was clicked, victims were taken to a malicious website that immediately exploits the bug to gain access to the victim’s PC data. 

Kaspersky provided little detail about the bug at the time of the Chrome patch, but said that the bug allowed the attackers to bypass Chrome’s sandbox protections, which limit the browser’s access to other data on the user’s computer. Kaspersky said the bug affects all other browsers based on Google’s Chromium engine.

In a separate analysis, Kaspersky said the bug was likely used in an espionage campaign, typically designed to stealthily monitor and steal data from a target’s device, usually over a period of time. The Russia-headquartered security firm said the hackers sent personalized phishing emails to Russian media representatives and employees at educational institutions. 

It’s unclear who was exploiting the bug, but Kaspersky attributed the campaign to a likely state-sponsored or government-backed group of hackers. 

Browsers like Chrome are a frequent target for malicious hackers and government-backed groups. Zero-day bugs capable of breaking through their protections and into the victim’s sensitive device data can be sold at high prices. In 2024, one zero-day broker was offering up to $3 million for exploitable bugs that can be triggered from over the internet. 

Google said Chrome updates will roll out over the coming days and weeks.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

谷歌Chrome 漏洞修复 黑客攻击 浏览器安全
相关文章