Chrome Zero-Day Exploited to Deliver Italian Memento Labs' LeetAgent Spyware

 

A already obscure (zero-day) defenselessness in Google Chrome was weaponized prior this year to quietly provide a measured surveillance toolchain that analysts presently say ties back to computer program created by Italy’s questionable observation firm Token Labs. The revelation — revealed amid an examination into a long-running focused on campaign — joins a Chrome sandbox elude followed as CVE-2025-2783 to the arrangement of a loader known as LeetAgent, which in turn has been watched introducing a more progressed commercial spyware item named Dante. Kaspersky’s Worldwide Investigate and Examination Group (Awesome) driven the investigation and displayed the discoveries at the Security Examiner Summit in late October 2025. 


Kaspersky


+1




What happened (brief version)




In Walk 2025, assailants utilized a Chrome zero-day sandbox elude (CVE-2025-2783) in focused on phishing emails. Going to a noxious interface in Chrome was adequate to trigger the abuse and pick up code execution on the victim’s have. Google afterward fixed the imperfection after being informed. 


Security Affairs


+1




Kaspersky’s follow-up examination into those interruptions revealed LeetAgent, a loader/backdoor that has been in circulation since at slightest 2022 and which the analysts found being utilized nearby or to send Dante, a commercial spyware item created and sold by Token Labs (the company shaped from the remainders of the infamous Hacking Group). 


Kaspersky


+1




The campaign — named by analysts “Operation Forum roll” — focused on organizations in Russia and Belarus, counting media outlets, inquire about educate and government-adjacent substances, utilizing phishing draws tied to a genuine Russian conference to lower doubt. 


Security Affairs


+1




The specialized chain (how the contamination worked)




According to Kaspersky’s specialized write-up, the assault chain had a few striking stages:




Spear-phishing draw — casualties gotten custom-made messages (or short-lived URLs) posturing as solicitations or assets related to a genuine conference or gathering. The brief joins were planned to see genuine and to be clicked from Chrome. 


Kaspersky




Chrome zero-day abuse — essentially going to the pernicious URL with an up-to-date, unpatched Chrome come about in abuse of CVE-2025-2783 (a sandbox elude). This gave the aggressor a toehold exterior of Chrome’s renderer prepare. Google fixed the imperfection after notice. 


Security Affairs


+1




Dropper/Loader (LeetAgent) — once code execution was accomplished, a lightweight loader named LeetAgent was introduced. LeetAgent can perform observation, move along the side, and in a few cases act as a dropper for more feature-complete spyware. Kaspersky follows LeetAgent’s utilization back to at slightest 2022. 


Kaspersky


+1




Payload (Dante) — in a subset of episodes, LeetAgent was utilized to provide Dante, a commercial reconnaissance instrument from Keepsake Labs. Dante gives progressed capabilities ordinary of commercial caught suites: inaccessible command execution, record exfiltration, keystroke capture, screen and sound collecting, and other checking highlights. Kaspersky’s investigation found code and framework joins tying Dante organizations to the same administrators leveraging LeetAgent. 


Kaspersky


+1




Kaspersky emphasizes that LeetAgent some of the time worked alone (as the end-stage embed), and in other cases it acted as a venturing stone to Dante. This measured, “loader + payload” engineering makes attribution and evaluation harder: the same low-cost loader can be utilized by different performing artists and acquired spyware can be worked by unmistakable clients. 


Kaspersky




Who is Token Labs (and why this matters)




Memento Labs is the successor organization to the once-infamous Hacking Group — a company that in the 2010s sold hostile interruption and reconnaissance devices to law requirement and insights administrations some time recently being freely compromised by a expansive information spill in 2015. Since at that point the gather reconstituted and rebranded, and in 2023 started promoting a unused spyware item called Dante in closed occasions focused on at government clients. The appearance of Dante-like artifacts in real-world interruptions is striking since it would be the to begin with open documentation of this family being utilized “in the wild” since the product’s revealing. 


The Record from Recorded Future


+1




Why this matters:




Commercial spyware in genuine surveillance operations. The utilize of commercial, off-the-shelf reconnaissance suites in focused on campaigns has long obscured the line between “state tools” and “commercial products.” If Dante is being utilized operationally, it raises questions approximately who bought or obtained the computer program, and what oversight (in the event that any) existed. 


The Record from Recorded Future




Reappearance of a questionable merchant. Hacking Team’s spill in 2015 provoked universal investigation since their items were appeared to be mishandled to surveil writers, activists, and political adversaries. The reemergence of their successor’s innovation in dynamic campaigns draws consideration from human rights, arrangement, and defense communities. 


Security Affairs




Kaspersky and other outlets are cautious to note that finding code reuse and foundation cover is not the same as demonstrating that Keepsake Labs straightforwardly commissioned the interruptions. Commercial spyware is sold and now and then re-sold or forked, and clients can work it without the vendor’s inclusion in each operation. Kaspersky’s inquire about, be that as it may, follows specialized cover that makes the connect to Dante and Token Labs conceivable and commendable of advance request. 


Kaspersky


+1




Who were the targets?




Kaspersky’s examination centered on a campaign that focused on substances in Russia and Belarus, including:




Media outlets and journalists




Academic and inquire about institutions




Government-adjacent organizations and select private firms




The aggressors utilized Russian-language draws and enlisted framework steady with focusing on those geographies. The campaign’s administrators (followed beneath the transitory title “Forum roll” by Kaspersky) shown a few operational tradecraft and phonetic prompts that indicated at skill in the locale, in spite of the fact that Kaspersky too famous botches recommending at slightest a few non-native association. 


Security Affairs


+1




Timeline and patching




March 2025: Kaspersky to begin with watched the focused on phishing campaign that utilized the Chrome zero-day to provide LeetAgent. Kaspersky detailed the defenselessness to Google. 


Security Affairs




Subsequent months: Google discharged a fix for CVE-2025-2783. Extra examination by Kaspersky connected the campaign to LeetAgent and to Dante artifacts found in other interruptions that shared tooling and framework. 


Security Week


+1




October 2025: Kaspersky freely uncovered the broader inquire about, counting introduction fabric shared at the Security Investigator Summit 2025. Numerous security outlets detailed the discoveries in late October 2025. 


Kaspersky


+1




If you run Chrome (or oversee Chrome in your organization), this timeline underlines the basic significance of applying seller upgrades expeditiously; sandbox get away are especially perilous since they permit browser-based imperfections to raise to full framework compromise.




Limits and open questions




While the specialized joins are powerful, a few instabilities remain:




Attribution vs. tooling cover. Code reuse and shared foundation habitually happen in malware biological systems. Kaspersky’s report appears joins between LeetAgent and Dante, but does not give conclusive prove that Token Labs administrators themselves executed these particular interruptions. It’s conceivable a third party gotten Dante or replicated modules. Kaspersky is unequivocal that they might not decide who commissioned Forum Troll's operations. 


Kaspersky


+1




Customer/operators obscure. Indeed when a commercial spyware item is utilized in an assault, recognizing the client who obtained or conveyed it is troublesome without logs, charging, or spill prove. 


The Record from Recorded Future




Scope of diseases. Open announcing so distant reports focused on interruptions in Russia and Belarus connected to Forum roll; there’s no wide prove of worldwide mass diseases from this specific chain. Kaspersky said it found no prove of dynamic Dante diseases among its clients at the time of detailing. 


The Record from Recorded Future




What protectors and clients ought to do




Patch browsers quickly. If you haven’t upgraded Chrome since March–April 2025, upgrade to the most recent steady discharge that incorporates the settle for CVE-2025-2783. Aggressors regularly weaponize unpatched browsers through joins in phishing sends. 


Security Week




Harden e-mail taking care of. Treat startling conference welcomes and URL easy routes with doubt — especially those utilizing short-lived joins or sending substance that inquires beneficiaries to press from a browser. Utilize link-checking and URL rewriting/proxying at the portal where conceivable. 


Security Affairs




Monitor for loader behavior. Pointers tied to LeetAgent and Dante (record hashes, C2 spaces) have been distributed by Kaspersky and others; SOC groups ought to ingest risk bolsters and chase for known pointers and behaviors steady with loaders and commercial reconnaissance inserts. 


Kaspersky


+1




Limit presentation to high-risk tooling. Where conceivable, isolated browsing from advantaged sessions (utilize devoted, solidified browsing hosts/VMs) and confine the browsing benefits of chairmen. Sandboxing and handle confinement offer assistance constrain misuse affect but are not a silver bullet. 


SecurityWeek




Broader implications




The Kaspersky divulgences are a update of three diligent patterns in cutting edge cyberespionage:




Commercialization of hostile apparatuses. Sellers that plan and offer reconnaissance devices for law enforcement/intelligence make a showcase where progressed capabilities are commodified — and in this manner possibly mishandled or repurposed exterior their aiming utilize. 


The Record from Recorded Future




Exploit chaining by means of browsers. Browser zero-days stay a favored starting get to vector since clients are conditioned to tap joins. Sandbox get away that permit farther code execution raise that chance drastically. 


Security Affairs




Operational reuse and sharing. Loaders like LeetAgent can work as a common “glue” between astute interruptions and commercial spyware payloads, empowering dissimilar on-screen characters to use the same base tooling. That complicates attribution and increments the potential for spillover manhandle. 


Kaspersky

Post a Comment

0 Comments