Chrome Zero-Day Exploited to Deliver Memento Labs’ LeetAgent Spyware

Critical Security Alert: Chrome Zero-Day Used to Deploy Italian Spyware

A critical security flaw in Google Chrome was actively exploited in the wild—a zero-day vulnerability—to distribute sophisticated surveillance software known as LeetAgent. The espionage tool is linked directly to the Italian information technology and services provider, Memento Labs, highlighting the ongoing threat posed by commercially available mercenary spyware.

This incident underscores the immediate and evolving danger posed by threat actors who leverage previously unknown vulnerabilities to conduct targeted surveillance and data exfiltration operations.

The most crucial action for all users is to immediately update Google Chrome to the latest patched version to mitigate the risk associated with this vulnerability.


Understanding the Zero-Day Attack Chain

A zero-day vulnerability is a security flaw that is unknown to the software vendor (in this case, Google) and for which no patch exists at the time of exploitation. This leaves users completely exposed until the vendor can develop and deploy a fix.

The specific vulnerability exploited in this campaign allowed attackers to execute malicious code within the Chrome browser environment. This initial breach served as the entry point for the subsequent delivery and installation of the LeetAgent spyware.

Key Characteristics of the Exploit:

  • Targeting: The attack was highly targeted, suggesting involvement in state-sponsored espionage or high-value corporate intelligence gathering, typical of zero-day use.
  • Exploit Mechanism: The attack likely involved a complex exploit chain, combining the zero-day flaw with other techniques to bypass Chrome’s robust security sandboxing mechanisms.
  • Immediate Patch: Following discovery, Google swiftly released a security update to address the vulnerability, emphasizing the severity of the threat.

LeetAgent: A Product of the Mercenary Spyware Industry

The payload delivered by the zero-day exploit was LeetAgent, a surveillance tool developed by Memento Labs. Memento Labs is an Italian firm operating in the commercial surveillance sector, often referred to as the ‘lawful intercept’ industry.

This incident is significant because it provides concrete evidence of a commercial vendor’s tool being deployed via a highly valuable zero-day exploit, demonstrating the capability and reach of these private surveillance companies.

Capabilities of LeetAgent Spyware

Spyware like LeetAgent is designed for comprehensive digital espionage, enabling remote operators to gain deep access to a victim’s device. While specific details of the LeetAgent version used in this attack remain under investigation, typical capabilities of such tools include:

  • Data Exfiltration: Stealing documents, emails, browsing history, and stored credentials.
  • Real-Time Monitoring: Capturing keystrokes (keylogging) and recording audio/video via the device’s microphone and camera.
  • Location Tracking: Monitoring the device’s geographical location.
  • Communication Interception: Accessing encrypted messages and calls from various communication apps.

The use of commercial spyware in conjunction with zero-day vulnerabilities represents a significant escalation in digital surveillance, making it accessible to a wider range of government and private entities globally.

Memento Labs Context

Memento Labs, like other firms in this controversial sector, develops and sells sophisticated hacking tools primarily to government and law enforcement agencies. The discovery of LeetAgent being deployed in the wild via a zero-day exploit raises serious concerns about the oversight and potential misuse of these powerful surveillance technologies against dissidents, journalists, or political opponents.


User Action and Security Recommendations

Given the severity of a zero-day exploit, immediate action is necessary to ensure protection against this specific threat and future vulnerabilities.

What You Must Do Now

  1. Update Chrome Immediately: Ensure your Google Chrome browser is updated to the latest available version. Chrome typically updates automatically, but users should manually check by navigating to Settings > About Chrome to trigger the update process.
  2. Verify Operating System Updates: Ensure your operating system (Windows, macOS, Linux) is also fully patched, as exploits often chain browser vulnerabilities with OS flaws.
  3. Use Security Software: Maintain up-to-date antivirus and endpoint detection and response (EDR) solutions.
  4. Practice Caution: Be highly suspicious of unsolicited links, attachments, or requests, especially those received via email or messaging apps, as these are common vectors for delivering initial exploit links.

Broader Security Posture

This attack serves as a stark reminder that even widely used and well-secured software like Chrome is susceptible to highly sophisticated, targeted attacks. Organizations and individuals should prioritize layered security defenses and maintain a rigorous patching schedule.


Key Takeaways

  • The Threat: A Google Chrome zero-day vulnerability was actively exploited in a targeted attack campaign.
  • The Payload: The exploit delivered LeetAgent, a powerful espionage tool.
  • The Source: LeetAgent is developed by the Italian commercial surveillance vendor, Memento Labs.
  • The Solution: Google has released a patch. Immediate updating of Chrome is mandatory to secure devices.
  • The Context: This incident highlights the ongoing proliferation and misuse of mercenary spyware sold by private companies to government clients worldwide.

Conclusion

The successful exploitation of a Chrome zero-day to deploy Memento Labs’ LeetAgent spyware is a significant event in the cybersecurity landscape of 2025. It reinforces the reality that commercial surveillance tools are now a primary component of advanced persistent threats (APTs). For the average user, the immediate priority is simple: update your browser. For the industry, this incident demands continued scrutiny of the ethics and regulation surrounding the sale and deployment of powerful, intrusive surveillance technology by private firms.

Source: Internet

Original author: The Hacker News

Originally published: October 28, 2025

Editorial note: Our team reviewed and enhanced this coverage with AI-assisted tools and human editing to add helpful context while preserving verified facts and quotations from the original source.

We encourage you to consult the publisher above for the complete report and to reach out if you spot inaccuracies or compliance concerns.

Author

  • Eduardo Silva is a Full-Stack Developer and SEO Specialist with over a decade of experience. He specializes in PHP, WordPress, and Python. He holds a degree in Advertising and Propaganda and certifications in English and Cinema, blending technical skill with creative insight.

Share this: