newstrooper newstrooper
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
Reading: Google Chrome Zero-Day CVE-2025-2783 Taxoff exploits Trinper Backdoor
Share

News Trooper

Your Global Insight, Delivered Daily.

Search
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
Follow US
© 2025 All Rights Reserved | Powered by News Trooper News
News Trooper > Technology > Google Chrome Zero-Day CVE-2025-2783 Taxoff exploits Trinper Backdoor
Technology

Google Chrome Zero-Day CVE-2025-2783 Taxoff exploits Trinper Backdoor

June 17, 2025 4 Min Read
Share
Google Chrome Zero-Day CVE-2025-2783 Taxoff exploits Trinper Backdoor
SHARE

Google Chrome’s current patched security flaw was exploited as zero day by a threat actor known as Taxoff to deploy backdoor code names Trimper.

The attacks observed by positive technology in mid-March 2025 included the use of a sandbox escape vulnerability tracked as CVE-2025-2783 (CVSS score: 8.3).

Google addressed the flaws later that month after Kaspersky reported wild exploitation in a campaign called ForumTroll’s Operations targeting various Russian organizations.

“The first attack vector was a phishing email with malicious links,” said security researchers Stanislav Pizov and Vladislav Lunin. “When the victim clicked on the link, it triggered a one-click exploit (CVE-2025-2783), leading to the installation of the Trinper Backdoor adopted by Taxoff.”

The phishing email is said to be disguised as an invitation to the Primakov Measurement Forum (the same Lua detailed by Kaspersky).

Taxoff is the name assigned to the hacking group first documented by a Russian cybersecurity company in late November 2024.

The backdoor written in C++ utilizes multi-threading to capture victim host information, record keystrokes, collect files that match specific extensions (.doc, .xls, .ppt, .rtf, and .pdf), establish a connection with a remote server to receive commands, and exclude execution results.

Instructions sent from the Command and Control (C2) server extend the functionality of the implant, read/write files, run commands using CMD.exe, launch a reverse shell, change directories, and shut down itself.

“Multithreading provides a high degree of parallelism to hide backdoors while retaining the ability to collect and remove data, installing additional modules and maintaining communication with C2,” Lunin said at the time.

Positive Technologies said investigation into the invasion in mid-March 2025 discovered another attack dating back to October 2024. This also started with a phishing email.

See also  Why Meta's biggest AI bets aren't in the model - it's in the data

The email message also included a link with a ZIP archive file downloaded with Windows shortcuts. This eventually launched a PowerShell command that provided the decoy document, removing the loader responsible for launching the Trimperbackdoor with the open source doughnut loader. The attack variation is known to replace the donut loader in favor of the cobalt strike.

According to the company, the attack chain shares several tactical similarities with another hacking group tracked as Team46, increasing the likelihood that the two threat activity clusters are the same.

Interestingly, another set of phishing emails sent by Team46 attackers a month ago from Moscow-based carrier Rostelecom, alerted recipients of a maintenance outage last year.

These emails included a ZIP archive. This was embedded with a shortcut that invoked PowerShell commands that deployed loaders previously used in attacks targeting unknown Russian companies in the railway freight industry.

The March 2024 intrusion detailed by Doctor Web is notable for downloading and running undecided malware, with the fact that one of the payloads weaponized by a DLL hijacking vulnerability in the Yandex browser (CVE-2024-6473, CVSS score: 8.4) as Zero-day. Resolved in version 24.7.1.380, released in September 2024.

“The group utilizes zero-day exploits, allowing for more effective infiltration of secure infrastructure,” the researchers said. “This group also creates and uses sophisticated malware, means that they have a long-term strategy and intend to maintain the sustainability of their compromised systems for a long period of time.”

Share This Article
Facebook Twitter Copy Link
Previous Article Los Angeles Angels star Ben Joyce undergoes surgery after suffering a season with shoulder injuries Los Angeles Angels star Ben Joyce undergoes surgery after suffering a season with shoulder injuries
Next Article Studio and cinema executives debate differing priorities at CineEurope Studio and cinema executives debate differing priorities at CineEurope
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular News

Musk’s decision to limit political spending leaves some Republicans cold

Musk’s decision to limit political spending leaves some Republicans cold

Elon Musk's pledge to retreat from campaign spending -- if…

June 2, 2025
GOP Rep. Bill Huizenga is preparing to run for Michigan's open Senate seat

GOP Rep. Bill Huizenga is preparing to run for Michigan's open Senate seat

McKinnack Island, Mich. -- Republican Rep. Bill Huizenga is preparing…

June 2, 2025
'It betrays our values': Progressives grapple with deadly shooting

'It betrays our values': Progressives grapple with deadly shooting

Progressive is tackling that two people who worked at the…

June 2, 2025
Beshear, Khanna to headline Dem mayor summit in July

Beshear, Khanna to headline Dem mayor summit in July

Two potential 2028 presidential primary candidates will descend on Cleveland…

June 2, 2025
Democrats are ‘stuck in that unfortunate reality’ in debate over Biden's illness

Democrats are ‘stuck in that unfortunate reality’ in debate over Biden's illness

24 hours after Sunday's announcement that former President Joe Biden…

June 2, 2025

You Might Also Like

Apple Zero-Clock flaws in messages abused by journalist spies using Paragon Spyware
Technology

Apple Zero-Clock flaws in messages abused by journalist spies using Paragon Spyware

7 Min Read
Silver Fox Apt targets Taiwan with complex GH0stringe and HoldingHands rat malware
Technology

Silver Fox Apt targets Taiwan with complex GH0stringe and HoldingHands rat malware

3 Min Read
Reduce attribution confusion in Microsoft and CrowdStrike launches shared threat actor glossary
Technology

Reduce attribution confusion in Microsoft and CrowdStrike launches shared threat actor glossary

3 Min Read
Small deep fakes may be a bigger threat
Technology

Small deep fakes may be a bigger threat

18 Min Read
newstrooper
newstrooper

Welcome to News Trooper, your reliable destination for global news that matters. In an age of information overload, we stand as a dedicated news platform committed to delivering timely, accurate, and insightful coverage of the world’s most significant events and trends.

  • Business
  • Entertainment
  • Gaming
  • Politics
  • Sports
  • Technology
  • Travel
  • World News
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2025 All Rights Reserved | Powered by News Trooper News

Welcome Back!

Sign in to your account

Lost your password?