Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Japan’s sushi legend in ‘Jiro Dreams of Sushi’ documentary turns 100

October 26, 2025

Louvre heist leaves a cultural wound — and may turn French Crown Jewels into legend

October 26, 2025

By the Numbers: Why trick-or-treaters may bag more gummy candy than chocolate this Halloween

October 25, 2025
Facebook X (Twitter) Instagram
Trending
  • Japan’s sushi legend in ‘Jiro Dreams of Sushi’ documentary turns 100
  • Louvre heist leaves a cultural wound — and may turn French Crown Jewels into legend
  • By the Numbers: Why trick-or-treaters may bag more gummy candy than chocolate this Halloween
  • Health providers turning to prescriptions to get people outside
  • Poker’s NBA-and-Mafia betting scandal echoes movies, popular culture
  • Book lovers and history buffs find solace in centuries-old athenaeums
  • Grandmothers in Colombia get the quinceañera they never had
  • Russia’s population is getting smaller and older. Putin sees it as a national security threat
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Monday, October 27
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Russian APT Exploiting Mail Servers Against Government, Defense Organizations
Cybersecurity

Russian APT Exploiting Mail Servers Against Government, Defense Organizations

By adminMay 16, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 94


The Russian state-sponsored group APT28 has been exploiting XSS vulnerabilities in mail servers in a widespread campaign targeting government and defense entities, ESET reports.

Also tracked as Fancy Bear, Forest Blizzard, Sednit, and Sofacy, and linked to the Russian General Staff Main Intelligence Directorate (GRU), APT28 has been active since at least 2004, targeting energy, government, military, and media entities in the US and Europe.

Two weeks ago, France accused APT28 of compromising a dozen government organizations and other French entities. One of the attacks, targeting the TV5Monde broadcasting station, occurred a decade ago.

On Thursday, ESET shared details on a wave of APT28 attacks aimed at organizations in Europe, Africa, and South America that involved the exploitation of vulnerable Roundcube, Horde, MDaemon, and Zimbra mail servers since September 2023.

As part of the campaign, dubbed Operation RoundPress, the Russian hackers injected the victims’ webmail pages with malicious JavaScript code designed to steal credentials and exfiltrate contacts and messages.

In September 2023, the APT targeted an XSS vulnerability in Roundcube, tracked as CVE-2020-35730, to load arbitrary JavaScript code on the webmail page. The flaw was added to CISA’s Known Exploited Vulnerabilities (KEV) catalog in June 2023.

In 2024, Operation RoundPress expanded to Horde, MDaemon, and Zimbra servers, and added another Roudcube flaw to the arsenal, namely CVE-2023-43770, which was added to the KEV catalog in February 2024. The MDaemon bug, now patched and tracked as CVE-2024-11182, was exploited as a zero-day.

The hacking group was observed sending XSS exploits via email to execute JavaScript code in the victim’s browser, in the context of the webmail webpage, meaning that it could only access data from the victim’s account.

Advertisement. Scroll to continue reading.

“Note that, in order for the exploit to work, the target must be convinced to open the email message in the vulnerable webmail portal. This means that the email needs to bypass any spam filtering and the subject line needs to be convincing enough to entice the target into reading the email message,” ESET explains.

The observed payloads, tailored for each mail server but collectively tracked as ‘SpyPress’, would create rules to send copies of emails to the attackers, steal webmail credentials (auto-filled in a hidden form or entered by the victim on a fake login page), collect messages and contact information, and bypass two-factor authentication.

In 2024, the attacks mainly targeted entities associated with the war in Ukraine, such as governmental organizations in Ukraine and defense companies in Bulgaria and Romania. However, African, European, and South American governments were also hit.

“Over the past two years, webmail servers such as Roundcube and Zimbra have been a major target for several espionage groups such as Sednit, GreenCube, and Winter Vivern. Because many organizations don’t keep their webmail servers up to date and because the vulnerabilities can be triggered remotely by sending an email message, it is very convenient for attackers to target such servers for email theft,” ESET notes.

Related: Russia-Linked APT Star Blizzard Uses ClickFix to Deploy New LostKeys Malware, Google Warns

Related: Firefox Affected by Flaw Similar to Chrome Zero-Day Exploited in Russia

Related: Russian Espionage Group Using Ransomware in Attacks

Related: Russian Ransomware Gang Exploited Windows Zero-Day Before Patch



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply

Don't Miss
Billionaires

OpenEvidence’s Daniel Nadler $1.3 Billion Richer In Just Three Months After The AI Startup Hits $6 Billion Valuation

October 20, 2025

OpenEvidence’s Daniel NadlerMauricio Candela for Forbes OpenEvidence, which Forbes profiled in July, has been signing…

Alex Bouaziz On Deel’s Latest Fundraise And Why He’s Not Worried About Litigation

October 20, 2025

Meet The Florida Sugar Barons Worth $4 Billion And Getting Sweet Deals From Donald Trump

October 17, 2025

Why Direct Lending Is Not In A Bubble

October 16, 2025
Our Picks

Japan’s sushi legend in ‘Jiro Dreams of Sushi’ documentary turns 100

October 26, 2025

Louvre heist leaves a cultural wound — and may turn French Crown Jewels into legend

October 26, 2025

By the Numbers: Why trick-or-treaters may bag more gummy candy than chocolate this Halloween

October 25, 2025

Health providers turning to prescriptions to get people outside

October 25, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.