New Google Chrome Zero-Day Actively Exploited by State-Aligned Threat Actors
Google Threat Analysis Group (TAG) and the Chrome Security Team have issued an urgent security alert regarding a new zero-day vulnerability that is actively exploited in the wild by state-aligned threat actors.
The flaw affects the latest versions of Google Chrome for Windows, macOS, Linux and Android.
According to Google, successful exploitation may lead to:
arbitrary code execution within the browser context
bypass of sandbox and isolation protections
theft of session cookies, tokens and sensitive data
injection of malicious scripts through compromised websites
TAG reports that the attacks are highly targeted and affect:
government institutions
operators of critical infrastructure
major enterprises in technology and energy
privileged service providers (MSP/MSSP)
How the Exploit Works
Google outlines a multi-stage attack chain:
✔ Stage 1: Targeted delivery
Victims receive links to compromised or attacker-controlled websites that serve the exploit.
✔ Stage 2: Sandbox escape
Attackers attempt to break out of Chrome’s sandbox to execute code on the underlying system.
✔ Stage 3: Credential and session theft
Chrome cookies, security tokens and session data are harvested to gain access to internal corporate systems.
✔ Stage 4: Secondary payloads
Some observed cases include spyware modules or lateral movement tools.
Google confirms that the sophistication of the exploit matches the operational profile of advanced, state-aligned APT groups.
Who Is at Risk?
Essentially every organization using Chrome, including:
cloud-native teams
financial institutions and public-sector bodies
enterprises using Google Workspace or Chrome Enterprise
environments with BYOD or mobile endpoints
DIAMATIX Perspective
Browser-based zero-days are dangerous because they exploit the most common corporate activity: web access. They bypass perimeter defenses and often appear as legitimate traffic.
DIAMATIX strengthens detection and response through:
Shield SIEM/XDR
correlates endpoint, browser, network and identity telemetry
detects suspicious Chrome child-process behavior
identifies anomalous session and cookie theft patterns
MDR 360° + 24/7 SOC
immediate detection of exploit chains
real-time incident response
behavioral analytics for post-exploitation activity
Zero-Trust controls
restrict access from compromised browsers
reduce blast radius through identity segmentation
Patch Management and Hardening Guidance
urgent deployment of Chrome security patches
alignment with CIS benchmarks for browser hardening
“Zero-day exploitation shifts the battlefield to everyday tools like browsers. The only effective answer is continuous detection, correlated visibility and rapid response.”
Sources
Google TAG — Zero-Day Exploitation Reports
Chrome Security Blog — Security Update Notices
CISA — Known Exploited Vulnerabilities Catalog (KEV)
Ready to go further?
Experience how continuous detection and response enhance compliance in action with MDR 360°.
→ Request MDR 360° Demo




