Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain
Kaspersky GReAT experts discovered a complex APT attack on Russian organizations dubbed Operation ForumTroll, which exploits zero-day vulnerabilities in Google Chrome.
Your antivirus vendor’s technical support can provide help in combating threats.
If you are experiencing problems with your security solution, contact your vendor’s technical support.
If you are looking for a description of a malicious or potentially unwanted program, and cannot find it on the site, you can ask us to write and publish a description.
If you have identified a vulnerability in a Kaspersky Lab product, please send details to vulnerability@kaspersky.com.
If you have identified a vulnerability in this or any Kaspersky Lab site, please send details to websecurity@kaspersky.com.
We cannot answer any queries on how to deal with malware or product functionality.
Kaspersky GReAT experts discovered a complex APT attack on Russian organizations dubbed Operation ForumTroll, which exploits zero-day vulnerabilities in Google Chrome.
In this article, we discuss the tools and TTPs used in the SideWinder APT’s attacks in H2 2024, as well as shifts in its targets, such as an increase in attacks against the maritime and logistics sectors.
Kaspersky researchers analyze EAGERBEE backdoor modules, revealing a possible connection to the CoughingDown APT actor.
While investigating an incident involving the BellaCiao .NET malware, Kaspersky researchers discovered a C++ version they dubbed “BellaCPP”.