Russian hackers exploit Zimbra flaw in Ukrainian govt attacks
好的,我现在需要帮用户总结一篇文章,控制在100字以内。首先,我得仔细阅读文章内容,抓住主要信息。 文章讲的是俄罗斯的APT28黑客组织利用Zimbra协作套件的一个漏洞攻击乌克兰政府机构。这个漏洞是CVE-2025-66376,属于高危安全漏洞,未认证的攻击者可以利用存储型XSS进行远程代码执行,进而控制服务器和邮箱。 CISA已经将这个漏洞加入目录,并要求相关部门在两周内修复。安全研究人员发现APT28通过钓鱼邮件传播恶意脚本,窃取凭证和数据。Zimbra被频繁攻击,尤其是俄罗斯支持的威胁组织。 总结时要包括:APT28、Zimbra漏洞、攻击乌克兰政府、钓鱼邮件、数据窃取等关键点。确保语言简洁明了,不超过100字。 </think> 俄罗斯支持的APT28黑客组织利用Zimbra协作套件的高危漏洞CVE-2025-66376攻击乌克兰政府机构。该漏洞允许未认证攻击者通过存储型XSS实现远程代码执行,窃取凭证和数据。CISA已将该漏洞加入目录并要求修复。 2026-3-19 15:0:21 Author: www.bleepingcomputer.com(查看原文) 阅读量:9 收藏

Russian military hackers

Hackers part of APT28, a state-backed threat group linked to Russia's military intelligence service (GRU), are exploiting a Zimbra Collaboration Suite (ZCS) vulnerability in attacks targeting Ukrainian government entities.

This high-severity security flaw (tracked as CVE-2025-66376 and patched in early November) stems from a stored cross-site scripting (XSS) that unauthenticated attackers can exploit to gain remote code execution (RCE) and compromise the Zimbra server and the target's email account.

On Wednesday, the Cybersecurity and Infrastructure Security Agency (CISA) added the vulnerability to its catalog of vulnerabilities exploited in the wild. CISA also ordered Federal Civilian Executive Branch (FCEB) agencies to secure their servers within two weeks, as mandated by the Binding Operational Directive (BOD) 22-01 issued in November 2021.

While the U.S. cybersecurity agency didn't provide further details on the ongoing exploitation of CVE-2025-66376, security researchers at Seqrite Labs reported a day earlier that the Zimbra XSS vulnerability had been exploited by APT28 military hackers in attacks against Ukraine.

The Ukrainian State Hydrology Agency (a critical infrastructure entity under the Ministry of Infrastructure that provides navigational, maritime, and hydrographic support) was one of the targets of this phishing campaign (named Operation GhostMail).

"The phishing email has no malicious attachments, no suspicious links, no macros. The entire attack chain lives inside the HTML body of a single email, there are no malicious attachments," Seqrite Labs said.

Attack flow
CVE-2025-66376 attack flow (Seqrite Labs)

​The APT28 (aka Fancy Bear, Strontium) hackers' malicious messages delivered an obfuscated JavaScript payload that exploits the CVE-2025-66376 vulnerability when the recipient opens the email in a vulnerable Zimbra webmail session.

"The script executes silently in the browser and begins harvesting credentials, session tokens, backup 2FA codes, browser-saved passwords, and the contents of the victim's mailbox going back 90 days with all the data exfiltrated over both DNS and HTTPS," the researchers added.

Zimbra security flaws are frequently targeted in attacks, including by Russian state-sponsored threat groups, and have been used to breach thousands of vulnerable email servers in recent years.

For instance, starting in February 2023, the Russian Winter Vivern cyberespionage group used another reflected XSS exploit to breach Zimbra webmail portals and spy on the communications of NATO-aligned organizations and persons, including government officials, military personnel, and diplomats.

In October 2024, U.S. and U.K. cyber agencies also warned that APT29 (aka Cozy Bear, Midnight Blizzard) hackers linked to Russia's Foreign Intelligence Service (SVR) were attacking vulnerable Zimbra servers "at a mass scale," exploiting a vulnerability previously used to steal email account credentials.

Zimbra is a widely popular email and collaboration software suite used by hundreds of millions of people, including hundreds of government agencies and thousands of businesses worldwide.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/russian-apt28-military-hackers-exploit-zimbra-flaw-in-ukrainian-govt-attacks/
如有侵权请联系:admin#unsafe.sh