	{"id":103607,"date":"2025-03-27T14:56:17","date_gmt":"2025-03-27T21:56:17","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=103607"},"modified":"2025-03-27T14:56:17","modified_gmt":"2025-03-27T21:56:17","slug":"google-chrome-patches-zero-day-used-to-spread-sophisticated-malware","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/","title":{"rendered":"Google Chrome patches zero-day used to spread &#8220;sophisticated malware&#8221;"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter wp-image-103617 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/03\/Chromium-based-browsers-Google-Chrome-Microsoft-Edge-Brave-Opera-Vivaldi-logos-icons-red-this-is-fine-600x300-1.jpg\" alt=\"Icons of the most popular Chromium-based browsers: Google Chrome, Microsoft Edge, Brave, Opera, and Vivaldi\" width=\"600\" height=\"300\" \/>On Tuesday, March 25, the <a href=\"https:\/\/chromereleases.googleblog.com\/2025\/03\/stable-channel-update-for-desktop_25.html\" target=\"_blank\" rel=\"noopener\">Google Chrome<\/a> browser was updated to version 134.0.6998.177\/.178 to address a zero-day vulnerability\u2014one that has been actively exploited in the wild. This is the second Chromium vulnerability this year for which Google is aware of real-world exploitation; <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/\">Apple reported the previous one<\/a> to Google in early March.<\/p>\n<h3>A security flaw used to spread &#8220;sophisticated malware&#8221;<\/h3>\n<p>Google says that &#8220;an exploit for CVE-2025-2783 exists in the wild.&#8221; <strong>This means that users must install patches urgently.<\/strong><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-fixes-chrome-zero-day-exploited-in-espionage-campaign\/\" target=\"_blank\" rel=\"noopener\">According to researchers<\/a> who observed the vulnerability in the wild, it let attackers &#8220;bypass Google Chrome\u2019s sandbox protection.&#8221; Attackers chained their exploitation of this security bug with another exploit, which &#8220;enabled remote code execution on compromised systems&#8221; and installed &#8220;sophisticated malware.&#8221;<\/p>\n<p>Based on the malware&#8217;s functionality, the researchers believe its main purpose was espionage.<\/p>\n<p>Although the researchers only observed this attack installing Windows malware, the same vulnerability could potentially be exploited to spread Mac malware, too. Thus it&#8217;s important to update your browser no matter which operating system you use.<\/p>\n<h3>Other browsers require urgent updates, too<\/h3>\n<p>Whenever Chrome gets a security update, other browsers based on the <a href=\"https:\/\/www.chromium.org\/Home\/\" target=\"_blank\" rel=\"noopener\">Chromium<\/a> open-source Web browser project generally require an update, too. Notable browsers built upon the Chromium codebase include\u00a0<strong>Microsoft Edge<\/strong>, <strong>Arc<\/strong>, <strong>Brave<\/strong>, <strong>Vivaldi<\/strong>, and <strong>Opera<\/strong>.<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-5274\" target=\"_blank\" rel=\"noopener\">Microsoft Edge<\/a>, <a href=\"https:\/\/brave.com\/latest\/\" target=\"_blank\" rel=\"noopener\">Brave<\/a>, and <a href=\"https:\/\/vivaldi.com\/blog\/desktop\/minor-update-two-7-2\/\" target=\"_blank\" rel=\"noopener\">Vivaldi<\/a> all got updates on Wednesday, March 26. These browsers are based on the most recent Chromium version.<\/p>\n<p>Meanwhile, Opera&#8217;s browsers are based on older Chromium code bases; this means that the engineers who develop them must backport security patches. <a href=\"https:\/\/blogs.opera.com\/desktop\/2025\/03\/opera-117-0-5408-163-stable-update\/\" target=\"_blank\" rel=\"noopener\">Opera, Opera GX, and Opera Air<\/a> all supposedly addressed CVE-2025-2783 on Thursday, March 27. However, <strong>Opera Air for Mac<\/strong> doesn&#8217;t appear to have been updated since March 5, meaning it <strong>likely contains many vulnerabilities<\/strong>\u2014including <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/\">the zero-day that Apple reported<\/a> to Google.<\/p>\n<p>Although Arc got <a href=\"https:\/\/resources.arc.net\/hc\/en-us\/articles\/20498293324823-Arc-for-macOS-2024-2025-Release-Notes\" target=\"_blank\" rel=\"noopener\">an update<\/a> on Thursday, March 27, it was to an older and still vulnerable Chromium build. The Arc browser therefore remains vulnerable, as of when this article is being published.<\/p>\n<h3>How to update Chromium-based desktop browsers<\/h3>\n<p><strong>Mac users can update their Chrome, Brave, Edge, or Opera browsers<\/strong> by clicking on the application menu (e.g. &#8220;Chrome&#8221; or &#8220;Microsoft Edge,&#8221; next to the Apple logo menu), and then clicking the first item in that menu (e.g. &#8220;About Google Chrome&#8221; or &#8220;About Microsoft Edge&#8221;). The browser will check for updates; if an update is available, it will prompt you to restart the app to complete the update.<\/p>\n<p><strong>Arc and Vivaldi for macOS<\/strong> have a slightly different update procedure. After clicking on the Arc or Vivaldi menu (next to the Apple menu), click on &#8220;Check for Updates\u2026&#8221; to ensure you have the latest version installed.<\/p>\n<p><strong>Windows users can update their browsers<\/strong> by following the steps provided by each browser maker: <a href=\"https:\/\/support.google.com\/chrome\/answer\/95414?co=GENIE.Platform%3DDesktop&amp;oco=1\" target=\"_blank\" rel=\"noopener\">Chrome<\/a>, <a href=\"https:\/\/resources.arc.net\/hc\/en-us\/articles\/21489650267031-Update-Arc-Browser\" target=\"_blank\" rel=\"noopener\">Arc<\/a>, <a href=\"https:\/\/community.brave.com\/t\/how-to-update-brave\/384780\" target=\"_blank\" rel=\"noopener\">Brave<\/a>, <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/microsoft-edge-update-settings-af8aaca2-1b69-4870-94fe-18822dbb7ef1\" target=\"_blank\" rel=\"noopener\">Edge<\/a>, <a href=\"https:\/\/help.opera.com\/en\/latest\/crashes-and-issues\/#updateBrowser\" target=\"_blank\" rel=\"noopener\">Opera<\/a>, <a href=\"https:\/\/help.vivaldi.com\/desktop\/install-update\/update-vivaldi\/\" target=\"_blank\" rel=\"noopener\">Vivaldi<\/a>.<\/p>\n<h3>How to update Chromium-based mobile browsers<\/h3>\n<p><strong>Android users<\/strong> should check the Google Play Store app for the latest versions of their browsers and other apps.<\/p>\n<p>Mobile browsers on <strong>iOS and iPadOS<\/strong> use Safari&#8217;s WebKit engine, rather than Chromium&#8217;s Blink and V8 engines. Therefore, this particular vulnerability does not affect the iOS or iPadOS versions of any Web browsers. If you would like to update your iPhone and iPad browsers anyway, you can do so via the App Store. (Here&#8217;s <a href=\"https:\/\/support.apple.com\/en-us\/HT202180\" target=\"_blank\" rel=\"noopener\">how to manually check for and install updates<\/a>.)<\/p>\n<p>Starting with iOS 17.4, browser makers may opt into using their own rendering engines. However, this is only available in the EU, for compliance with the Digital Markets Act. No major third-party browser has chosen to bring its own engine to iOS yet.<\/p>\n<h3>Non-browser apps need updates, too<\/h3>\n<p>As we&#8217;ve noted in the past, many non-browser apps, including\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/chromium-vulnerabilities-threaten-electron-app-security\/\">Electron apps<\/a>, also rely on the Chromium browser codebase for rendering HTML content. These include the desktop versions of apps like <strong>1Password, Discord, Dropbox, Figma, GitHub, Microsoft Teams, Signal, Skype, Slack, Trello, Twitch, WhatsApp, WordPress, and Zoom.<\/strong><\/p>\n<p>Notably, the Electron framework does not get updated in tandem with Chromium, so some <a href=\"https:\/\/www.intego.com\/mac-security-blog\/chromium-vulnerabilities-threaten-electron-app-security\/#0ce\">Electron-based apps may remain vulnerable for months<\/a>. For this and other reasons, it&#8217;s important to keep all your other apps updated as well.<\/p>\n<p>To <a href=\"https:\/\/support.apple.com\/en-us\/HT202180#macos\" target=\"_blank\" rel=\"noopener nofollow\">update Mac App Store apps<\/a>, open the App Store, then click Updates, and click on Update All. Other apps usually have their own separate in-app or external update mechanisms. In some cases, you may need to update an app manually by downloading a new version from the developer&#8217;s site.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"YVIlwdUFPL\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/chromium-vulnerabilities-threaten-electron-app-security\/\">Chromium vulnerabilities threaten Electron app security<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Chromium vulnerabilities threaten Electron app security&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/chromium-vulnerabilities-threaten-electron-app-security\/embed\/#?secret=YVIlwdUFPL\" data-secret=\"YVIlwdUFPL\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/x.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google Chrome patched a serious vulnerability used to spread espionage malware in real-world attacks. Microsoft Edge, Brave, Vivaldi, and Opera also require updates; patch now!<\/p>\n","protected":false},"author":14,"featured_media":103615,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[11],"tags":[4736,4543,38,173,4682,181,4607,93,4680],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Google Chrome patched a serious vulnerability used to spread espionage malware in real-world attacks. Microsoft Edge, Brave, Vivaldi, and Opera also require updates; patch now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google Chrome patches zero-day used to spread &quot;sophisticated malware&quot; - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Google Chrome patched a serious vulnerability used to spread espionage malware in real-world attacks. Microsoft Edge, Brave, Vivaldi, and Opera also require updates; patch now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-27T21:56:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/03\/Chromium-based-browsers-Google-Chrome-Microsoft-Edge-Brave-Opera-Vivaldi-logos-icons-red-this-is-fine-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/03\/Chromium-based-browsers-Google-Chrome-Microsoft-Edge-Brave-Opera-Vivaldi-logos-icons-red-this-is-fine-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/03\/Chromium-based-browsers-Google-Chrome-Microsoft-Edge-Brave-Opera-Vivaldi-logos-icons-red-this-is-fine-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Chromium-based browsers Google Chrome, Microsoft Edge, Brave, Opera, Vivaldi icons logos with red gradient and subtle this-is-fine meme background\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/\",\"name\":\"Google Chrome patches zero-day used to spread \\\"sophisticated malware\\\" - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/#primaryimage\"},\"datePublished\":\"2025-03-27T21:56:17+00:00\",\"dateModified\":\"2025-03-27T21:56:17+00:00\",\"description\":\"Google Chrome patched a serious vulnerability used to spread espionage malware in real-world attacks. Microsoft Edge, Brave, Vivaldi, and Opera also require updates; patch now!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google Chrome patches zero-day used to spread &#8220;sophisticated malware&#8221;\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Google Chrome patches zero-day used to spread &#8220;sophisticated malware&#8221;\",\"datePublished\":\"2025-03-27T21:56:17+00:00\",\"dateModified\":\"2025-03-27T21:56:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/#webpage\"},\"wordCount\":837,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/03\/Chromium-based-browsers-Google-Chrome-Microsoft-Edge-Brave-Opera-Vivaldi-logos-icons-red-this-is-fine-400x260-1.jpg\",\"keywords\":[\"Arc\",\"Brave\",\"Chrome\",\"Chrome Browser\",\"Chromium\",\"Google Chrome\",\"Microsoft Edge\",\"Opera\",\"Vivaldi\"],\"articleSection\":[\"Software &amp; Apps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Google Chrome patched a serious vulnerability used to spread espionage malware in real-world attacks. Microsoft Edge, Brave, Vivaldi, and Opera also require updates; patch now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/","og_locale":"en_US","og_type":"article","og_title":"Google Chrome patches zero-day used to spread \"sophisticated malware\" - The Mac Security Blog","og_description":"Google Chrome patched a serious vulnerability used to spread espionage malware in real-world attacks. Microsoft Edge, Brave, Vivaldi, and Opera also require updates; patch now!","og_url":"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2025-03-27T21:56:17+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/03\/Chromium-based-browsers-Google-Chrome-Microsoft-Edge-Brave-Opera-Vivaldi-logos-icons-red-this-is-fine-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/03\/Chromium-based-browsers-Google-Chrome-Microsoft-Edge-Brave-Opera-Vivaldi-logos-icons-red-this-is-fine-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/03\/Chromium-based-browsers-Google-Chrome-Microsoft-Edge-Brave-Opera-Vivaldi-logos-icons-red-this-is-fine-400x260-1.jpg","width":400,"height":260,"caption":"Chromium-based browsers Google Chrome, Microsoft Edge, Brave, Opera, Vivaldi icons logos with red gradient and subtle this-is-fine meme background"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/","name":"Google Chrome patches zero-day used to spread \"sophisticated malware\" - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/#primaryimage"},"datePublished":"2025-03-27T21:56:17+00:00","dateModified":"2025-03-27T21:56:17+00:00","description":"Google Chrome patched a serious vulnerability used to spread espionage malware in real-world attacks. Microsoft Edge, Brave, Vivaldi, and Opera also require updates; patch now!","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Google Chrome patches zero-day used to spread &#8220;sophisticated malware&#8221;"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Google Chrome patches zero-day used to spread &#8220;sophisticated malware&#8221;","datePublished":"2025-03-27T21:56:17+00:00","dateModified":"2025-03-27T21:56:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/#webpage"},"wordCount":837,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/03\/Chromium-based-browsers-Google-Chrome-Microsoft-Edge-Brave-Opera-Vivaldi-logos-icons-red-this-is-fine-400x260-1.jpg","keywords":["Arc","Brave","Chrome","Chrome Browser","Chromium","Google Chrome","Microsoft Edge","Opera","Vivaldi"],"articleSection":["Software &amp; Apps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/google-chrome-patches-zero-day-used-to-spread-sophisticated-malware\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/03\/Chromium-based-browsers-Google-Chrome-Microsoft-Edge-Brave-Opera-Vivaldi-logos-icons-red-this-is-fine-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-qX5","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103607"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=103607"}],"version-history":[{"count":8,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103607\/revisions"}],"predecessor-version":[{"id":103627,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103607\/revisions\/103627"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/103615"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=103607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=103607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=103607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}