Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

Hackers exploit critical CrushFTP flaws to gain admin access on unearned servers

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Russia-linked APT28 misused MDAEMON Zero Day to hack government webmail servers
Identity

Russia-linked APT28 misused MDAEMON Zero Day to hack government webmail servers

userBy userMay 15, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

New findings from ESET show that Russia-related threat actors are attributed to cyberspy operations targeting webmail servers such as RoundCube, Horde, Mdaemon, and Zimbra.

The activity, which began in 2023, is known as Codename Round Press by the Slovak Cybersecurity Company. This is due to moderate confidence in a Russian state-sponsored hacking group tracked as APT28. It is also known as Blue Delta, Fancy Bear, Fighting Ursa, Forest Blizzard, Froze Lake, Iron Twilight, ITG05, Pawn Storm, Cednyte, Sofacy, and TA422.

“The ultimate goal of this operation is to steal sensitive data from specific email accounts,” ESET researcher Matthieu Faou said in a report shared with Hacker News. “Most of the victims are Eastern European government agencies and defense companies, but we observe that governments in Africa, Europe and South America are also being targeted.”

This is not the first time that APT28 has been linked to an attack that exploits a flaw in its webmail software. In June 2023, recorded Future detailed the abuse of multiple flawed threat actors on the RoundCube (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026).

Cybersecurity

Since then, other threat actors like Winter Vivern and UNC3707 (aka Greencube) have also targeted email solutions including RoundCube in a variety of campaigns over the years. The relationship with the operation RoundPress APT28 is due to the overlapping email addresses used to send similarities to spear phishing emails in certain server configuration methods.

It is known that the majority of the 2024 campaign is Ukrainian government agencies or defence companies in Bulgaria and Romania, some of which produce Soviet-era weapons sent to Ukraine. Other targets include governments, military and academic organizations in Greece, Cameroon, Ecuador, Serbia and Cyprus.

This attack requires the exploitation of XSS vulnerabilities in Horde, Mdaemon, and Zimbra to execute arbitrary JavaScript code in the context of a webmail window. It is worth noting that CVE-2023-43770 was added by the US Cybersecurity and Infrastructure Security Agency (CISA) to the Known Exploited Vulnerabilities (KEV) catalog in February 2024.

Attacks targeting Horde (an unspecified defect not fixed in Horde WebMail 1.0 released in 2007), RoundCube (CVE-2023-43770), and Zimbra (CVE-2024-27443) use the already known and patched vulnerability in patient XSSSS. I assigned the CVE Identifier CVE-2024-11182 (CVSS score: 5.3) and applied the patch in version 24.5.1 last November.

“Sedonite will email these XSS exploits,” says Faou. “Exploits lead to the execution of malicious JavaScript code in the context of WebMail client web pages running in a browser window. Therefore, they can only read and extract data that is accessible from the victim’s account.”

However, for the exploit to be successful, the target must communicate to the vulnerable webmail portal to open an email message, assuming that the software can bypass the spam filter and land in the user’s inbox. The content of the email itself is harmless. The malicious code that triggers the XSS flaws is invisible to the user as it resides within the HTML code in the body of the email message.

The success of exploitation leads to the execution of an obfuscated JavaScript payload named Spypress. Malware is reloaded every time an email message trapped in a booby is opened, despite the lack of a permanent mechanism.

Cybersecurity

“In addition, we’ve detected several SpyPress.RoundCube payloads with the ability to create Sive rules,” ESET said. “Spypress.RoundCube creates a rule that sends a copy of all incoming emails to an attacker-controlled email address. Sieve rules are a feature of RoundCube, so the rules run without malicious scripts being executed.”

The collected information is excluded via HTTP POST requests to hard-coded Command and Control (C2) servers. Some variants of the malware are also known to capture login history, two factor authentication (2FA) code, and create an MDAEMON application password to retain access to the mailbox even if the password or 2FA code changes.

“For the past two years, webmail servers such as RoundCube and Zimbra have been the main target for several spy groups, such as Sednit, Greencube and Winter Vivern,” says Faou. “It’s very convenient for attackers to target such servers for email theft, as many organizations can keep their webmail servers up to date and remotely trigger vulnerabilities by sending email messages.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Articlesportsbet.io releases 1 million USDT gifts to mark the Champions League finale
Next Article Engineering smarter nuclear fuels through mechanistic understandings of fuel performance
user
  • Website

Related Posts

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

July 20, 2025

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

July 20, 2025

Hackers exploit critical CrushFTP flaws to gain admin access on unearned servers

July 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

Hackers exploit critical CrushFTP flaws to gain admin access on unearned servers

Astronomer CEO resigns following Cold Play Concert Scandal

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.