{"id":18629,"date":"2025-10-28T21:40:42","date_gmt":"2025-10-28T20:40:42","guid":{"rendered":"https:\/\/plus.maciejpiasecki.info\/index.php\/2025\/10\/28\/dante-malware-reportedly-targeted-chrome-users-through-zero-day-exploit\/"},"modified":"2025-10-28T21:55:47","modified_gmt":"2025-10-28T20:55:47","slug":"dante-malware-reportedly-targeted-chrome-users-through-zero-day-exploit","status":"publish","type":"post","link":"https:\/\/plus.maciejpiasecki.info\/index.php\/2025\/10\/28\/dante-malware-reportedly-targeted-chrome-users-through-zero-day-exploit\/","title":{"rendered":"&#039;Dante&#039; Malware reportedly targeted Chrome users through zero-day exploit"},"content":{"rendered":"<p>Google Chrome is generally thought of as a pretty safe browser to use, but that doesn\u2019t make it an impenetrable fortress, and a Chrome exploit used to distribute malware is the latest proof of that. A zero-day is an exploit that, once discovered, is immediately used to attack an entity or other users. This gives the company that makes the software that contains the exploit zero days to prepare for its malicious use. Instead, they\u2019re forced to work on patching the previously unknown vulnerability after the fact.<\/p>\n<p>According to a report from Bleeping Computer, a zero-day was recently used to target a variety of entities by distributing malware. Reported targets include Russian media outlets, educational institutions, and financial institutions. The malware, known as \u2018Dante,\u2019 is said to be a piece of commercial spyware. It was also reportedly created by Memento Labs, an Italian company formerly known as Hacker Team.<\/p>\n<p>The Chrome exploit that was distributing malware was discovered by Kaspersky<\/p>\n<p>Dante was initially discovered back in March of this year, as malware used as part of an attack called Operation ForumTroll that targeted Russian organizations. However, it wasn\u2019t until recently that Kaspersky shared more intricate details of the malware and its inner workings.<\/p>\n<p>As noted by Kaspersky, the initial point of infection from this malware occurred when users clicked a link in a phishing email. Once at the malicious website, the victims were \u201cverified\u201d and then the exploit was executed.<\/p>\n<p>According to reports, these phishing emails were sending out invites to Russian organizations to attend the Primakov Readings forum.<\/p>\n<p>Kaspersky further details that the Dante software, as well as other tools used in Operation ForumTroll, were developed by Memento Labs, linking the company to these attacks in some form. It\u2019s worth noting that this company isn\u2019t 100% confirmed to be behind the attacks. As noted by Bleeping Computer, there is a possibility that someone else was behind the zero-day attack and distribution of the malware.<br \/>\nThe post 'Dante&#8217; Malware reportedly targeted Chrome users through zero-day exploit appeared first on Android Headlines.&#013;<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/plus.maciejpiasecki.info\/wp-content\/uploads\/2025\/10\/00-Chrome-zero-day-exploit-logo-image-DG-AH-2022.jpg\" width=\"1600\" height=\"1200\">&#013;<br \/>\nSource: ndroidheadlines.com&#013;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google Chrome is generally thought of as a pretty safe browser to use, but that doesn\u2019t make it an impenetrable [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":18630,"comment_status":"false","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-18629","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bez-kategorii"],"_links":{"self":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts\/18629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/comments?post=18629"}],"version-history":[{"count":1,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts\/18629\/revisions"}],"predecessor-version":[{"id":18631,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts\/18629\/revisions\/18631"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/media\/18630"}],"wp:attachment":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/media?parent=18629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/categories?post=18629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/tags?post=18629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}