Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Tedhar CEO Paolo Ardoino says ‘No need is needed’

    June 8, 2025

    What is MicroSD Express? Everything You Need To Know

    June 8, 2025

    5 to avoid pressure washing mistakes

    June 8, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Hack Government webmail hacked through XSS Bugs in Global Spy Campaign
    Security

    Hack Government webmail hacked through XSS Bugs in Global Spy Campaign

    PineapplesUpdateBy PineapplesUpdateMay 18, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Hack Government webmail hacked through XSS Bugs in Global Spy Campaign
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Hack Government webmail hacked through XSS Bugs in Global Spy Campaign

    Hackers are running cyber cyberpayan campaigns worldwide, taking advantage of zero-day and N-Day falls in webmail servers to steal emails from high-value government organizations.

    ESET researchers Opened operation Give it characterized with moderate beliefs for Russian state-propelled hackers Apt28 (aka “fancy bear” or “sednet”).

    The campaign began in 2023 and continued in 2024 with the adoption of new exploits, targeting Round Cube, Hoarde, MDmon and Zimbra.

    Notable targets include governments in Greece, Ukraine, Serbia and Cameron, military units in Ukraine and Ecuador, Ukraine, Bulgaria and Defense Companies in Bulgaria and Romania and significant infrastructure in Ukraine and Bulgaria.

    Roundpress target
    Roundpress target
    Source: ESET

    Open the email, data is stolen

    The attack begins with a Spear-Fishing email that refers to current news or political events, which often includes excerpts from news articles to add validity.

    A malicious JavaScript Palor, embedded in the HTML body of email triggers the exploitation of a cross-site scripting (XSS) vulnerability in the webmail browser page used by the recipient.

    Whatever is necessary from the victim to open an email to see it, because no other interaction/click, redirection or data input is required to execute the malicious JavaScript script.

    Attack chain observation
    Attack chain observation
    Source: ESET

    There is no firm mechanism in the payload, so it is only executed when malicious email is opened.

    The script makes the credentials stored for the victim’s email accounts to trick browsers or password managers in autofiling.

    Credit Steel Function
    Credit Steel Function
    Source: ESET

    Additionally, it reads DOM or sends HTTP request to collect email messages, contact, webmail settings, login history, two-factor authentication and passwords.

    The data is then exfiltrated for hardcoded command-end-control (C2) address using HTTP post requests.

    Each script has a slightly different set of capabilities, which is adjusted to the product he is targeting.

    Targeted weaknesses

    Operation Roundpress targeted several XSS defects in various webmail products that important organizations usually use to inject their malicious JS scripts.

    Exploitation related to this campaign ESET includes the following flaws:

    • Roundcube-cve-2020-35730: A stored XSS blames hackers used in 2023 by embedding JavaScript directly into the body of an email. When the victims opened the email in a browser-based webmail session, the script was executed in their context, enabling credentials and data theft.
    • Roundcube-cve-2023-43770: How the roundcube handled the hyperlink text in an XSS vulnerability, leveraged in early 2024. Inappropriate sanitization allows the attackers to injected
    • Mdaemon-cve-2024-11182: A zero-day XSS defect in HTML Parser of Mdaemon email server was exploited by hackers at the end of 2024. Crafts a deformed title with a nombed tag, the attacker may be a hidden Payload, executing JavaScript. This enabled frequent access through credential theft, 2FA bypass and app passwords.
    • Hoarde – Unknown XSS: APT28 tried to take advantage of an old XSS vulnerability in the crowd by placing a script Handler. However, the attempt failed, the possibility that due to the built -in filtering in modern hoords versions. The accurate defect is unconfirmed, but it appears to be patched in the meantime.
    • Zimbra-cve-2024-27443: A XSS vulnerability in the calendar invited handling of the zimbra, which has not been actively tagged as an active exploitation earlier. Input from the X-Zimbra-Calandar-Intended for Header allowed JavaScript injection into the calendar UI. APT28 embedded a hidden script, which when invited the base 64 JavaScript decodes and executes.

    Although ESET does not report any roundpress activity for 2025, hackers methods can also be easily implemented this year, because there is one constant supply New XSS flaws in popular webmail products.


    Red Report 2025

    Based on the analysis of 14M malicious tasks, search for the top 10 MITERAT & CK techniques behind the 93% attacks and how to defend them against them.

    bugs Campaign Global government hack hacked Spy Webmail XSS
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleScream 7 is one of my most awaited new horror films-here are 5 things I want to see
    Next Article I exercised with Meta Quest 3 and FitxR for two weeks – 3 things I learned
    PineapplesUpdate
    • Website

    Related Posts

    Web3

    Coinbase, Bit Global and Legal Fight on WBTC Delisting

    June 8, 2025
    Security

    Remove project directors presented as malicious NPM package utilities

    June 8, 2025
    Security

    Supply series attacks Glustac NPM package with 960K weekly download

    June 7, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025594 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025536 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025465 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Meta delay entrusts ‘Bhamoth’ AI model, Openi and Google more than one more head start

    May 16, 20250 Views

    The OURA ring found a new rival with just one titanium design and 24/7 biometric tracking – no membership is required

    May 16, 20250 Views

    Filecoin, Lockheed Martin Test IPFS in space

    May 16, 20250 Views
    Our Picks

    Tedhar CEO Paolo Ardoino says ‘No need is needed’

    June 8, 2025

    What is MicroSD Express? Everything You Need To Know

    June 8, 2025

    5 to avoid pressure washing mistakes

    June 8, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.