Fancy Bear’s Email Escapade: Russian Hackers Pounce on Vulnerable Webmail Servers
Operation RoundPress, a cyber espionage operation by Russian APT28, exploits webmail vulnerabilities in servers like Roundcube. The scheme involves sending XSS exploits via email to execute malicious JavaScript, stealing credentials and emails from targets mainly in Eastern Europe. It’s a phishing scheme so sneaky, you’d think it was phishing for compliments.

Hot Take:
Looks like APT28, aka the Russian cyber spy troupe with more aliases than a secret agent convention, is back at it again. They’ve clearly got a thing for webmail servers, and this time, they’re playing peek-a-boo with your inbox using a bag of zero-day tricks. Consider this a not-so-friendly reminder to update your webmail software, or else you might find your emails starring in the latest cyber espionage drama, “Operation RoundPress!”
Key Points:
– Operation RoundPress is a cyber espionage operation targeting webmail servers via XSS vulnerabilities, attributed to APT28.
– The campaign focuses on governmental and defense entities in Eastern Europe, but also extends to Africa, Europe, and South America.
– The hackers exploit known and zero-day vulnerabilities in software like MDaemon, Roundcube, Horde, and Zimbra.
– APT28 delivers malicious JavaScript payloads, such as SpyPress, to steal credentials and emails from compromised accounts.
– The operation takes advantage of outdated webmail servers to exfiltrate data remotely and conveniently.