Recently, Kaspersky researchers found that a zero-day flaw was used in attacks. As such, Google issued a major Chrome security patch. Due to the flaw, attackers could go past the protection of Chrome’s sandbox using CVE-2025-2783. That is why a reliable IT service provider urges users to update their browser as soon as possible.
IT Service Provider Urges Chrome Users to Update Their Browser
The issue appeared when Chrome’s security system and Windows processes came together. According to a trusted IT service provider, due to the logical error, attackers could easily avoid the sandbox. This is the key protection in Chrome. Hence, the attackers were able to access the system remotely and could take over completely using this method.
In mid-March 2025, Kaspersky identified the problem. This happened after they detected new types of malware that had not been seen before. In this case, phishing emails were used wherein clicking a link in the email caused automatic infection on Chrome. This vulnerability allowed the browser’s defense system to be bypassed silently, said an IT service provider. Accordingly, the exploit was able to go unnoticed and work marvelously, even though it seemed harmless.
In their advisory, it was revealed that the problem occurred in Mojo on Windows because an incorrect handle was used in some cases. As a result, attackers could bypass important forms of protection. An IT service provider said that the issue has been given a high severity rating. With this, Google has verified that it’s already in use by hackers.
Malicious software was used in the “Operation ForumTroll” attack. This targeted Russian media, government, and school institutions, according to Kaspersky. The emails they sent were made to look like invites to an event known as Primakov Readings, said the IT service provider. The links were included in every phishing email and were only active for a short time. Because of this, it increased the difficulty of finding suspicious behavior. Still, Kaspersky’s tools detected the exploit almost immediately. According to an expert IT service provider, the attack required coordination and is suspected to come from actors operating at a state level. Likewise, the attackers seemed to be trying to take sensitive data by quietly getting into a computer system.
Following this discovery, Google acted quickly. On March 25, 2025, the company provided Chrome updates 134.0.6998.177 and 134.0.6998.178 to Windows users. The patches dealt with the problem of sandbox escapes. Version 134.0.6998.178 was released for the Extended Stable channel as well. Moreover, users are getting them step by step, but they can manually update to the new version by visiting “About Chrome” in the settings menu.
The attack had a two-part process. The first exploit was using the sandbox bypass (CVE-2025-2783), and the second allowed running code on the server. Investigations didn’t notice this second method, but by addressing the sandbox issue, the process ends completely according to a trusted IT service provider.
An expert IT service provider is urging people using Chrome to update the browser as soon as possible. While the update will arrive automatically, it’s safer to check manually. Click on the settings in Chrome, select “About Chrome,” and update the app. Kaspersky also advises being careful on the internet and avoiding clicking links from people you do not trust. They plan to post a thorough report once most users are secure against this bug.
This vulnerability proves that eleven advanced security features in browsers cannot fully prevent mistakes. Although uncommon, they can still do serious harm should it happen. Hence, it is important to always update your software and be cautious when you’re online. For businesses, this might not be as easy. Here at EB Solution, we have the tools and the expertise to ensure that your IT system runs smoothly and safely. Get in touch with us and discuss your IT needs with one of our expert IT management and cybersecurity professionals.