Operation RoundPress targeting highvalue webmail servers

Operation RoundPress is a Russia-aligned espionage campaign targeting webmail servers through XSS vulnerabilities. The attackers, believed to be the Sednit group, use spearphishing emails to exploit vulnerabilities in Roundcube, Horde, MDaemon, and Zimbra webmail software. Their goal is to steal confidential data from specific email accounts. The operation expanded its targets in 2024, using both known and zero-day vulnerabilities. Victims include government entities and defense companies, primarily in Eastern Europe. The attackers employ various JavaScript payloads (SpyPress) to steal credentials, exfiltrate contacts and emails, and in some cases bypass two-factor authentication. The campaign demonstrates the ongoing threat to organizations with outdated webmail servers. Author: AlienVault

Related Tags:
Cameroon

cve-2024-11182

cve-2024-27443

cve-2023-43770

eastern europe

webmail

SpyPress.ZIMBRA

SpyPress.ROUNDCUBE

SpyPress.MDAEMON

Associated Indicators:
60D592765B0F4E08078D42B2F3DE4F5767F88773

8EBBBC9EB54E216EFFB437A28B9F2C7C9DA3A0FA

B6C340549700470C651031865C2772D3A4C81310

A5948E1E45D50A8DB063D7DFA5B6F6E249F61652

2664593E2F5DCFDA9AAA1A2DF7C4CE7EEB1EDBB6

41FE2EFB38E0C7DD10E6009A68BD26687D6DBF4C

EBF794E421BE60C9532091EB432C1977517D1BE5

AD3C590D1C0963D62702445E8108DB025EEBEC70

8E6C07F38EF920B5154FD081BA252B9295E8184D