Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Tapo releases new security camera with bright floodlight

    Garmin fixes Smart Wake alarm issue in new beta update

    Highly rated LG C5 OLED TV in 42 to 65-inch screen sizes is now on sale at up to 65% off

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026
    • Business

      The HDD brand that brought you the 1.8-inch, 2.5-inch, and 3.5-inch hard drives is now back with a $19 pocket-sized personal cloud for your smartphones

      February 12, 2026

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025
    • Crypto

      Berachain Jumps 150% as Strategic Pivot Lifts BERA

      February 12, 2026

      Tom Lee’s BitMine (BMNR) Stock Faces Cost-Basis Risk — Price Breakdown at 10%?

      February 12, 2026

      Why the US Jobs Data Makes a Worrying Case for Bitcoin

      February 12, 2026

      MYX Falls Below $5 as Short Sellers Take Control — 42% Decline Risk Emerges

      February 12, 2026

      Solana Pins Its $75 Support on Short-Term Buyers — Can Price Survive This Risky Setup?

      February 12, 2026
    • Technology

      Tapo releases new security camera with bright floodlight

      February 12, 2026

      Garmin fixes Smart Wake alarm issue in new beta update

      February 12, 2026

      Highly rated LG C5 OLED TV in 42 to 65-inch screen sizes is now on sale at up to 65% off

      February 12, 2026

      PS Plus February 2026 Game Catalogue leaked: Three new games coming to Extra and Premium

      February 12, 2026

      Jony Ive reimagines Apple Car in skeuomorphic Ferrari Luce interior rebuffing Tesla touchscreens

      February 12, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Government webmail hacked via XSS bugs in global spy campaign
    Technology

    Government webmail hacked via XSS bugs in global spy campaign

    TechAiVerseBy TechAiVerseMay 18, 2025No Comments3 Mins Read5 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Government webmail hacked via XSS bugs in global spy campaign
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Government webmail hacked via XSS bugs in global spy campaign

    Hackers are running a worldwide cyberespionage campaign dubbed ‘RoundPress,’ leveraging zero-day and n-day flaws in webmail servers to steal email from high-value government organizations.

    ESET researchers who uncovered the operation attribute it with medium confidence to the Russian state-sponsored hackers APT28 (aka “Fancy Bear” or “Sednit”).

    The campaign started in 2023 and continued with the adoption of new exploits in 2024, targeting Roundcube, Horde, MDaemon, and Zimbra.

    Notable targets include governments in Greece, Ukraine, Serbia, and Cameroon, military units in Ukraine and Ecuador, defense companies in Ukraine, Bulgaria, and Romania, and critical infrastructure in Ukraine and Bulgaria.

    RoundPress targets
    Source: ESET

    Open email, have data stolen

    The attack starts with a spear-phishing email referencing current news or political events, often including excerpts from news articles to add legitimacy.

    A malicious JavaScript payload embedded in the HTML body of the email triggers the exploitation of a cross-site scripting (XSS) vulnerability in the webmail browser page used by the recipient.

    All that is needed from the victim is to open the email to view it, as no other interaction/clicks, redirections, or data input is required for the malicious JavaScript script to execute.

    Attack chain overview
    Source: ESET

    The payload has no persistence mechanisms, so it only executes when the malicious email is opened.

    The script creates invisible input fields to trick browsers or password managers into autofilling stored credentials for the victim’s email accounts.

    Credential stealer function
    Source: ESET

    Additionally, it reads the DOM or sends HTTP requests to collect email message content, contacts, webmail settings, login history, two-factor authentication, and passwords.

    The data is then exfiltrated to hardcoded command-and-control (C2) addresses using HTTP POST requests.

    Each script has a slightly different set of capabilities, adjusted for the product it’s targeting.

    Vulnerabilities targeted

    Operation RoundPress targeted multiple XSS flaws in various webmail products that important organizations commonly use to inject their malicious JS scripts.

    The exploitation ESET associated with this campaign involves the following flaws:

    • Roundcube – CVE-2020-35730: A stored XSS flaw the hackers used in 2023, by embedding JavaScript directly into the body of an email. When victims opened the email in a browser-based webmail session, the script executed in their context, enabling credential and data theft.
    • Roundcube – CVE-2023-43770: An XSS vulnerability in how Roundcube handled hyperlink text leveraged in early 2024. Improper sanitization allowed attackers to inject