LeetAgent: a tool shared by ForumTroll and Dante
LeetAgent is a malware tool used by the ForumTroll APT group, which exploited a zero-day Chrome vulnerability to infect Russian organizations. The same tools were also used to distribute Dante, a sophisticated commercial spyware developed by Memento Labs (formerly HackingTeam). Dante features modular encrypted components and self-destructs if inactive. The attacks targeted media, government, educational, and financial sectors primarily in Russia and Belarus. No known exploits are currently active in the wild beyond these campaigns. Detection has been achieved through advanced XDR solutions, and threat intelligence is available via Kaspersky’s APT data service. European organizations face risks mainly if targeted by similar threat actors or if they share infrastructure or partnerships with affected regions. Mitigation requires patching browsers, monitoring for indicators of compromise, and employing advanced detection tools. Given the malware’s sophistication, modularity, and use of zero-days, the threat severity is assessed as high.
AI Analysis
Technical Summary
The LeetAgent malware was identified during investigations into attacks by the ForumTroll APT group, which targeted Russian companies using a zero-day vulnerability (CVE-2025-2783) in Google Chrome. The infection vector involved spear-phishing emails inviting targets to a scientific forum, leading to malware deployment upon clicking malicious links. LeetAgent receives commands in 'Leet' modified spellings and was used in multiple attacks against media, government, educational, and financial institutions in Russia and Belarus. Further research revealed that the same toolset was used to distribute Dante spyware, a commercial product developed by Memento Labs, the successor to the infamous HackingTeam. Dante is a highly sophisticated modular spyware with encrypted modules unique per victim and a self-destruct mechanism if no control server commands are received. The malware’s modularity and encryption complicate detection and analysis. The attacks demonstrate a blend of state-level APT tactics and commercial spyware deployment, indicating a convergence of threat actor capabilities. Detection has been primarily through Kaspersky’s XDR solutions, and detailed threat intelligence is provided via their APT data service. No widespread exploitation beyond these campaigns is currently reported, but the presence of zero-day exploitation and advanced spyware indicates a significant threat to targeted organizations.
Potential Impact
For European organizations, the direct impact depends on whether they become targets or have business ties with affected Russian or Belarusian entities. The use of a zero-day Chrome vulnerability implies that any organization using vulnerable browser versions could be at risk if targeted. The modular and encrypted nature of Dante spyware allows attackers to conduct prolonged espionage, data exfiltration, and surveillance, potentially compromising confidentiality and integrity of sensitive information. The self-destruct feature complicates forensic investigations, potentially allowing attackers to cover tracks. The sectors targeted—media, government, education, and finance—are critical for European countries’ information security and economic stability. If similar campaigns spread or if European organizations are targeted by ForumTroll or related actors, the impact could include intellectual property theft, disruption of operations, and reputational damage. The medium severity rating reflects current limited spread but acknowledges the potential for escalation.
Mitigation Recommendations
European organizations should prioritize patching all Google Chrome instances to address CVE-2025-2783 and any related vulnerabilities promptly. Implement advanced endpoint detection and response (EDR) and extended detection and response (XDR) solutions capable of identifying LeetAgent and Dante indicators of compromise, including unusual command-and-control traffic and encrypted module behaviors. Conduct targeted threat hunting focusing on spear-phishing campaigns mimicking legitimate invitations or events, especially those involving scientific or governmental forums. Employ network segmentation and strict access controls to limit lateral movement if infection occurs. Regularly update threat intelligence feeds, including subscribing to specialized APT data services such as Kaspersky’s Threat Intelligence Portal, to stay informed of emerging TTPs and IoCs related to ForumTroll and Dante. Train employees on recognizing sophisticated phishing attempts and enforce multi-factor authentication to reduce account compromise risks. Finally, prepare incident response plans that include forensic readiness to handle malware with self-destruct capabilities.
Affected Countries
Russia, Belarus, Germany, France, United Kingdom, Poland, Italy, Netherlands
LeetAgent: a tool shared by ForumTroll and Dante
Description
LeetAgent is a malware tool used by the ForumTroll APT group, which exploited a zero-day Chrome vulnerability to infect Russian organizations. The same tools were also used to distribute Dante, a sophisticated commercial spyware developed by Memento Labs (formerly HackingTeam). Dante features modular encrypted components and self-destructs if inactive. The attacks targeted media, government, educational, and financial sectors primarily in Russia and Belarus. No known exploits are currently active in the wild beyond these campaigns. Detection has been achieved through advanced XDR solutions, and threat intelligence is available via Kaspersky’s APT data service. European organizations face risks mainly if targeted by similar threat actors or if they share infrastructure or partnerships with affected regions. Mitigation requires patching browsers, monitoring for indicators of compromise, and employing advanced detection tools. Given the malware’s sophistication, modularity, and use of zero-days, the threat severity is assessed as high.
AI-Powered Analysis
Technical Analysis
The LeetAgent malware was identified during investigations into attacks by the ForumTroll APT group, which targeted Russian companies using a zero-day vulnerability (CVE-2025-2783) in Google Chrome. The infection vector involved spear-phishing emails inviting targets to a scientific forum, leading to malware deployment upon clicking malicious links. LeetAgent receives commands in 'Leet' modified spellings and was used in multiple attacks against media, government, educational, and financial institutions in Russia and Belarus. Further research revealed that the same toolset was used to distribute Dante spyware, a commercial product developed by Memento Labs, the successor to the infamous HackingTeam. Dante is a highly sophisticated modular spyware with encrypted modules unique per victim and a self-destruct mechanism if no control server commands are received. The malware’s modularity and encryption complicate detection and analysis. The attacks demonstrate a blend of state-level APT tactics and commercial spyware deployment, indicating a convergence of threat actor capabilities. Detection has been primarily through Kaspersky’s XDR solutions, and detailed threat intelligence is provided via their APT data service. No widespread exploitation beyond these campaigns is currently reported, but the presence of zero-day exploitation and advanced spyware indicates a significant threat to targeted organizations.
Potential Impact
For European organizations, the direct impact depends on whether they become targets or have business ties with affected Russian or Belarusian entities. The use of a zero-day Chrome vulnerability implies that any organization using vulnerable browser versions could be at risk if targeted. The modular and encrypted nature of Dante spyware allows attackers to conduct prolonged espionage, data exfiltration, and surveillance, potentially compromising confidentiality and integrity of sensitive information. The self-destruct feature complicates forensic investigations, potentially allowing attackers to cover tracks. The sectors targeted—media, government, education, and finance—are critical for European countries’ information security and economic stability. If similar campaigns spread or if European organizations are targeted by ForumTroll or related actors, the impact could include intellectual property theft, disruption of operations, and reputational damage. The medium severity rating reflects current limited spread but acknowledges the potential for escalation.
Mitigation Recommendations
European organizations should prioritize patching all Google Chrome instances to address CVE-2025-2783 and any related vulnerabilities promptly. Implement advanced endpoint detection and response (EDR) and extended detection and response (XDR) solutions capable of identifying LeetAgent and Dante indicators of compromise, including unusual command-and-control traffic and encrypted module behaviors. Conduct targeted threat hunting focusing on spear-phishing campaigns mimicking legitimate invitations or events, especially those involving scientific or governmental forums. Employ network segmentation and strict access controls to limit lateral movement if infection occurs. Regularly update threat intelligence feeds, including subscribing to specialized APT data services such as Kaspersky’s Threat Intelligence Portal, to stay informed of emerging TTPs and IoCs related to ForumTroll and Dante. Train employees on recognizing sophisticated phishing attempts and enforce multi-factor authentication to reduce account compromise risks. Finally, prepare incident response plans that include forensic readiness to handle malware with self-destruct capabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://www.kaspersky.com/blog/forumtroll-dante-leetagent/54670/","fetched":true,"fetchedAt":"2025-10-27T15:23:10.078Z","wordCount":901}
Threat ID: 68ff8e5eba6dffc5e2ff113d
Added to database: 10/27/2025, 3:23:10 PM
Last enriched: 11/12/2025, 1:10:31 AM
Last updated: 12/11/2025, 10:57:58 PM
Views: 253
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Malicious Visual Studio Code Extensions Hide Trojan in Fake PNG Files
MediumHamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite
MediumGOLD SALEM tradecraft for deploying Warlock ransomware
MediumVS Code extensions contain trojan-laden fake image
MediumNew ‘DroidLock’ Android Malware Locks Users Out and Spies via Front Camera
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.