Explore Diverse Views.
Published loading...Updated

Spies hack high-value mail servers using an exploit from yesteryear

  • Security firm ESET reported in early 2025 that the Russia-linked Sednit group exploited cross-site scripting vulnerabilities to hack high-value mail servers worldwide.
  • The operations, named RoundPress by ESET, used spearphishing emails delivering XSS exploits primarily targeting Roundcube, Horde, MDaemon, and Zimbra webmail software throughout 2023 and 2024.
  • Sednit exploited both known and zero-day vulnerabilities such as the MDaemon zero-day CVE-2024-11182, deploying heavily obfuscated JavaScript payloads called SpyPress inside victims' webmail sessions.
  • SpyPress stole credentials, emails, and contacts, bypassed two-factor authentication by creating app passwords, and used Sieve rules to forward incoming mail for persistent data exfiltration to attacker servers.
  • The campaign focused on defense and government organizations linked to the Ukraine conflict in Eastern Europe and beyond, underscoring ongoing threats from unpatched webmail vulnerabilities.
Insights by Ground AI
Does this summary seem wrong?

11 Articles

All
Left
2
Center
1
Right
1
Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 50% of the sources lean Left
50% Left
Factuality

To view factuality data please Upgrade to Premium

Ownership

To view ownership data please Upgrade to Vantage

CSO Online broke the news in on Thursday, May 15, 2025.
Sources are mostly out of (0)