Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Posted on May 15, 2025May 15, 2025 By CWS

A Russia-linked menace actor has been attributed to a cyber espionage operation focusing on webmail servers akin to Roundcube, Horde, MDaemon, and Zimbra by way of cross-site scripting (XSS) vulnerabilities, together with a then-zero-day in MDaemon, based on new findings from ESET.
The exercise, which commenced in 2023, has been codenamed Operation RoundPress by the Slovak cybersecurity firm. It has been attributed with medium confidence to the Russian state-sponsored hacking group tracked as APT28, which can be known as BlueDelta, Fancy Bear, Combating Ursa, Forest Blizzard, FROZENLAKE, Iron Twilight, ITG05, Pawn Storm, Sednit, Sofacy, and TA422.
“The final word purpose of this operation is to steal confidential information from particular electronic mail accounts,” ESET researcher Matthieu Faou stated in a report shared with The Hacker Information. “Most victims are governmental entities and protection corporations in Jap Europe, though we’ve got noticed governments in Africa, Europe, and South America being focused as nicely.”
This isn’t the primary time APT28 has been tied to assaults exploiting flaws in webmail software program. In June 2023, Recorded Future detailed the menace actor’s abuse of a number of flaws in Roundcube (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to conduct reconnaissance and information gathering.

Since then, different menace actors like Winter Vivern and UNC3707 (aka GreenCube) have additionally focused electronic mail options, together with Roundcube in numerous campaigns over time. Operation RoundPress’ ties to APT28 stem from overlaps within the electronic mail deal with used to ship the spear-phishing emails and similarities in the best way sure servers had been configured.
A majority of the targets of the marketing campaign in 2024 have been discovered to be Ukrainian governmental entities or protection corporations in Bulgaria and Romania, a few of that are producing Soviet-era weapons to be despatched to Ukraine. Different targets embrace authorities, navy, and tutorial organizations in Greece, Cameroon, Ecuador, Serbia, and Cyprus.
The assaults entail the exploitation of XSS vulnerabilities in Horde, MDaemon, and Zimbra to execute arbitrary JavaScript code within the context of the webmail window. It is value noting that CVE-2023-43770 was added by the U.S. Cybersecurity and Infrastructure Safety Company (CISA) to its Recognized Exploited Vulnerabilities (KEV) catalog in February 2024.

Whereas the assaults focusing on Horde (an unspecified outdated flaw fastened in Horde Webmail 1.0 launched in 2007), Roundcube (CVE-2023-43770), and Zimbra (CVE-2024-27443) leveraged safety defects already identified and patched, the MDaemon XSS vulnerability is assessed to have been utilized by the menace actor as a zero-day. Assigned the CVE identifier CVE-2024-11182 (CVSS rating: 5.3), it was patched in model 24.5.1 final November.
“Sednit sends these XSS exploits by electronic mail,” Faou stated. “The exploits result in the execution of malicious JavaScript code within the context of the webmail shopper net web page working in a browser window. Subsequently, solely information accessible from the sufferer’s account could be learn and exfiltrated.”
Nonetheless, for the exploit to achieve success, the goal have to be satisfied to open the e-mail message within the weak webmail portal, assuming it is capable of bypass the software program’s spam filters and land on the person’s inbox. The contents of the e-mail themselves are innocuous, because the malicious code that triggers the XSS flaw resides inside the HTML code of the e-mail message’s physique and, subsequently, will not be seen to the person.
Profitable exploitation results in the execution of an obfuscated JavaScript payload named SpyPress that comes with the power to steal webmail credentials and harvest electronic mail messages and get in touch with info from the sufferer’s mailbox. The malware, regardless of missing a persistence mechanism, will get reloaded each time the booby-trapped electronic mail message is opened.

“As well as, we detected a couple of SpyPress.ROUNDCUBE payloads which have the power to create Sieve guidelines,” ESET stated. “SpyPress.ROUNDCUBE creates a rule that may ship a replica of each incoming electronic mail to an attacker-controlled electronic mail deal with. Sieve guidelines are a function of Roundcube and subsequently the rule might be executed even when the malicious script is not working.”
The gathered info is subsequently exfiltrated by way of an HTTP POST request to a hard-coded command-and-control (C2) server. Choose variants of the malware have additionally been discovered to seize login historical past, two-factor authentication (2FA) codes, and even create an software password for MDAEMON to retain entry to the mailbox even when the password or the 2FA code will get modified.
“Over the previous two years, webmail servers akin to Roundcube and Zimbra have been a serious goal for a number of espionage teams akin to Sednit, GreenCube, and Winter Vivern,” Faou stated. “As a result of many organizations do not maintain their webmail servers updated and since the vulnerabilities could be triggered remotely by sending an electronic mail message, it is rather handy for attackers to focus on such servers for electronic mail theft.”

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:APT28, Exploited, Government, Hack, MDaemon, RussiaLinked, Servers, Webmail, ZeroDay

Post navigation

Previous Post: Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper
Next Post: 5 BCDR Essentials for Effective Ransomware Defense

Related Posts

Fake AI Tools Used to Spread Noodlophile Malware, Targeting 62,000+ via Facebook Lures The Hacker News
Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS Malware The Hacker News
Qilin Ransomware Ranked Highest in April 2025 with Over 45 Data Leak Disclosures The Hacker News
How Small Teams Can Secure Their Google Workspace The Hacker News
Why Exposed Credentials Remain Unfixed—and How to Change That The Hacker News
Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats
  • Cybercrime-as-a-Service – Countering Accessible Hacking Tools
  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats
  • Cybercrime-as-a-Service – Countering Accessible Hacking Tools
  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News