Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Sprinter Health raises $55 million to expand its home health services

The US struggles for the clarity of the code. Canada may have an answer

NYU denies diplomas to students who criticize Israel in their opening speech

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Russia-linked APT28 misused MDAEMON Zero Day to hack government webmail servers
Identity

Russia-linked APT28 misused MDAEMON Zero Day to hack government webmail servers

userBy userMay 15, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

New findings from ESET show that Russia-related threat actors are attributed to cyberspy operations targeting webmail servers such as RoundCube, Horde, Mdaemon, and Zimbra.

The activity, which began in 2023, is known as Codename Round Press by the Slovak Cybersecurity Company. This is due to moderate confidence in a Russian state-sponsored hacking group tracked as APT28. It is also known as Blue Delta, Fancy Bear, Fighting Ursa, Forest Blizzard, Froze Lake, Iron Twilight, ITG05, Pawn Storm, Cednyte, Sofacy, and TA422.

“The ultimate goal of this operation is to steal sensitive data from specific email accounts,” ESET researcher Matthieu Faou said in a report shared with Hacker News. “Most of the victims are Eastern European government agencies and defense companies, but we observe that governments in Africa, Europe and South America are also being targeted.”

This is not the first time that APT28 has been linked to an attack that exploits a flaw in its webmail software. In June 2023, recorded Future detailed the abuse of multiple flawed threat actors on the RoundCube (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026).

Cybersecurity

Since then, other threat actors like Winter Vivern and UNC3707 (aka Greencube) have also targeted email solutions including RoundCube in a variety of campaigns over the years. The relationship with the operation RoundPress APT28 is due to the overlapping email addresses used to send similarities to spear phishing emails in certain server configuration methods.

It is known that the majority of the 2024 campaign is Ukrainian government agencies or defence companies in Bulgaria and Romania, some of which produce Soviet-era weapons sent to Ukraine. Other targets include governments, military and academic organizations in Greece, Cameroon, Ecuador, Serbia and Cyprus.

This attack requires the exploitation of XSS vulnerabilities in Horde, Mdaemon, and Zimbra to execute arbitrary JavaScript code in the context of a webmail window. It is worth noting that CVE-2023-43770 was added by the US Cybersecurity and Infrastructure Security Agency (CISA) to the Known Exploited Vulnerabilities (KEV) catalog in February 2024.

Attacks targeting Horde (an unspecified defect not fixed in Horde WebMail 1.0 released in 2007), RoundCube (CVE-2023-43770), and Zimbra (CVE-2024-27443) use the already known and patched vulnerability in patient XSSSS. I assigned the CVE Identifier CVE-2024-11182 (CVSS score: 5.3) and applied the patch in version 24.5.1 last November.

“Sedonite will email these XSS exploits,” says Faou. “Exploits lead to the execution of malicious JavaScript code in the context of WebMail client web pages running in a browser window. Therefore, they can only read and extract data that is accessible from the victim’s account.”

However, for the exploit to be successful, the target must communicate to the vulnerable webmail portal to open an email message, assuming that the software can bypass the spam filter and land in the user’s inbox. The content of the email itself is harmless. The malicious code that triggers the XSS flaws is invisible to the user as it resides within the HTML code in the body of the email message.

The success of exploitation leads to the execution of an obfuscated JavaScript payload named Spypress. Malware is reloaded every time an email message trapped in a booby is opened, despite the lack of a permanent mechanism.

Cybersecurity

“In addition, we’ve detected several SpyPress.RoundCube payloads with the ability to create Sive rules,” ESET said. “Spypress.RoundCube creates a rule that sends a copy of all incoming emails to an attacker-controlled email address. Sieve rules are a feature of RoundCube, so the rules run without malicious scripts being executed.”

The collected information is excluded via HTTP POST requests to hard-coded Command and Control (C2) servers. Some variants of the malware are also known to capture login history, two factor authentication (2FA) code, and create an MDAEMON application password to retain access to the mailbox even if the password or 2FA code changes.

“For the past two years, webmail servers such as RoundCube and Zimbra have been the main target for several spy groups, such as Sednit, Greencube and Winter Vivern,” says Faou. “It’s very convenient for attackers to target such servers for email theft, as many organizations can keep their webmail servers up to date and remotely trigger vulnerabilities by sending email messages.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Articlesportsbet.io releases 1 million USDT gifts to mark the Champions League finale
Next Article Engineering smarter nuclear fuels through mechanistic understandings of fuel performance
user
  • Website

Related Posts

Meta will train AI on EU user data from May 27th without consent. Noyb threatens lawsuits

May 15, 2025

Coinbase Agent has been bribed, ~1% of users’ data leaked. 20 million dollar terr attempt fails

May 15, 2025

Compliance-only pen test? It’s time to change your approach

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Sprinter Health raises $55 million to expand its home health services

The US struggles for the clarity of the code. Canada may have an answer

NYU denies diplomas to students who criticize Israel in their opening speech

2025 Digital Security Landscape: Major AI Trends and Emerging Challenges

Trending Posts

US lawyer Mayor Las Barraka claims he targeted his arrest in protest | Donald Trump News

May 15, 2025

US Supreme Court burns Trump administration over birthright citizenship | Donald Trump News

May 15, 2025

Can President Trump legally accept $400 million planes for free? | Donald Trump News

May 15, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

2025 Digital Security Landscape: Major AI Trends and Emerging Challenges

AI Food Technology Startup MetaFoodx raises $9.4 million to tackle $38.2 billion in kitchen waste with 3D scans

Regolo.ai: The future of AI is open, sustainable, EU-compliant

Proofpoint acquires rival Hornet security for over $1 billion to promote Europe’s expansion before IPOs

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.