Threat IntelHIGH

Threat Intel - Russian APT Exploits Zimbra XSS Flaw

🎯

Basically, a Russian hacker group is using a flaw in Zimbra emails to steal information from users in Ukraine.

Quick Summary

A Russian APT exploits a critical XSS flaw in Zimbra, targeting users in Ukraine. This attack uses HTML emails to run malicious scripts, risking user data. Immediate action is needed to mitigate the threat.

The Threat

A Russian Advanced Persistent Threat (APT) group, likely APT28, has exploited a critical Cross-Site Scripting (XSS) vulnerability in Zimbra, tracked as CVE-2025-66376. This flaw allows attackers to run malicious scripts through HTML emails. The vulnerability has a CVSS score of 7.2, indicating its high severity. By exploiting this flaw, attackers can take control of user accounts and compromise entire Zimbra environments, making it a significant threat to users, particularly in Ukraine.

The attack involves sending phishing emails that contain obfuscated JavaScript. When a victim opens the email, the script executes within their Zimbra session, allowing attackers to harvest sensitive information such as credentials, session tokens, and two-factor authentication (2FA) codes. This method of attack aligns with previous tactics used by Russian state-sponsored groups, emphasizing the ongoing cyber warfare targeting Ukraine.

Who's Behind It

The cyber espionage campaign is attributed to APT28, also known as Fancy Bear, a notorious group linked to the Russian government. This group has a history of targeting Ukrainian entities, particularly in the context of geopolitical tensions. The campaign, dubbed Operation GhostMail, demonstrates a sophisticated approach to social engineering, using compromised student email accounts to lend credibility to their phishing attempts.

On January 22, 2026, a national maritime agency was targeted using a compromised email, showcasing the group's focus on critical infrastructure in Ukraine. The targeting of government entities aligns with broader patterns of cyberattacks observed in the region, indicating a strategic effort to undermine Ukrainian stability.

Tactics & Techniques

The exploitation of CVE-2025-66376 involves a stored XSS vulnerability in Zimbra's Classic UI. Attackers can abuse CSS @import directives to execute scripts when the email is opened. This method not only allows for the theft of sensitive information but also enables persistent access to user accounts. The attackers utilize SOAP requests and dual-channel exfiltration methods via DNS and HTTPS to extract data, making detection and mitigation challenging.

The phishing emails are designed to appear legitimate, often masquerading as internship inquiries. This tactic increases the likelihood of user interaction with the malicious content. The campaign's infrastructure was established shortly before the attacks, indicating careful planning and execution by the threat actors.

Defensive Measures

To combat this threat, it is crucial for organizations using Zimbra to update to the latest versions, specifically 10.1.13 and 10.0.18, which address the XSS vulnerability. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-66376 to its Known Exploited Vulnerabilities catalog, mandating federal agencies to remediate the issue by April 1, 2026.

Users should be educated on the risks of opening unsolicited emails and the importance of verifying the sender's identity. Implementing robust email filtering solutions and multi-factor authentication can further enhance security against such phishing attacks. Organizations must remain vigilant and proactive in monitoring for signs of compromise, especially in light of the ongoing threat from APT groups targeting critical infrastructure.

🔒 Pro insight: Analysis pending for this article.

Original article from

Security Affairs · Pierluigi Paganini

Read Full Article

Related Pings

MEDIUMThreat Intel

Iran Cyberattacks - Feds Monitor Threats and Stryker Breach

Federal officials are keeping a close watch on Iranian cyber threats. The focus is on the recent Stryker breach, which has raised alarms about data security. Enhanced cybersecurity measures are being recommended to protect sensitive information. Stay informed as the situation develops.

CyberScoop·
HIGHThreat Intel

Identity Attacks - Understanding Cyber Horror Trends

Identity attacks are on the rise, with attackers manipulating consent to gain access. Organizations must enhance their security measures to combat these evolving threats. Stay informed to protect your systems.

Cisco Talos Intelligence·
HIGHThreat Intel

Cyber Attacks - 93% of UK Critical Infrastructure Affected

Cyber attacks have impacted nearly all UK critical infrastructure organizations this past year. With 93% reporting incidents, the growing threat landscape raises concerns. Organizations must adapt quickly to protect vital services.

IT Security Guru·
HIGHThreat Intel

Threat Intel - Bitrefill Blames North Korean Lazarus Group

Bitrefill has linked a recent cyberattack to North Korea's Lazarus group. The breach exposed customer data, raising concerns about crypto security. The company is enhancing its defenses.

BleepingComputer·
HIGHThreat Intel

Threat Intel - FBI Seizes Handala Sites After Stryker Attack

The FBI has taken down Handala's websites after the group attacked Stryker, wiping thousands of devices. This action disrupts their operations and highlights the ongoing cyber threat landscape. Organizations must enhance their defenses to prevent similar incidents.

BleepingComputer·
HIGHThreat Intel

Threat Intel - FBI and CISA Warn on Microsoft Intune Risks

A recent cyberattack on Stryker using Microsoft Intune has raised alarms. Over 200,000 devices were wiped, affecting operations globally. Organizations are urged to enhance their security measures to prevent similar incidents.

The Record·