Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Operation Roundish: Uncovering an APT28 Roundcube Exploitation Toolkit Targeting Ukraine

0
Medium
Published: Wed Mar 18 2026 (03/18/2026, 10:51:37 UTC)
Source: AlienVault OTX General

Description

An exposed open directory revealed a comprehensive Roundcube exploitation toolkit used by APT28 to target Ukrainian government entities. The toolkit includes XSS payloads, a Flask-based C2 server, CSS injection tools, and a Go-based implant. It enables credential harvesting, persistent mail forwarding, bulk email exfiltration, address book theft, and 2FA secret extraction. The primary target was identified as mail.dmsu.gov.ua, Ukraine's State Migration Service. Technical analysis shows significant overlaps with previously documented APT28 operations, while introducing new capabilities such as CSS-based side-channel attacks and browser credential theft. The toolkit's modular approach and sophisticated evasion techniques demonstrate APT28's evolving tactics in compromising webmail platforms for long-term intelligence gathering.

AI-Powered Analysis

AILast updated: 03/18/2026, 11:28:00 UTC

Technical Analysis

Operation Roundish is a newly uncovered exploitation toolkit developed and deployed by the Russian-linked APT28 (Fancy Bear) threat group. The toolkit specifically targets the Roundcube webmail platform, widely used by Ukrainian government entities, with the primary victim identified as Ukraine's State Migration Service (mail.dmsu.gov.ua). The toolkit was discovered in an exposed open directory, revealing a comprehensive suite of offensive capabilities. It includes cross-site scripting (XSS) payloads that enable attackers to execute malicious scripts within the victim's browser context, facilitating credential harvesting and session hijacking. A novel aspect of this toolkit is the use of CSS injection-based side-channel attacks, which allow stealthy browser credential theft and extraction of two-factor authentication (2FA) secrets, significantly enhancing the attacker’s ability to bypass traditional security controls. The toolkit also contains a Go-based implant for persistent access and a Flask-based command and control (C2) server to manage compromised systems. Attackers can perform persistent mail forwarding, bulk exfiltration of emails, and theft of address book data, enabling extensive intelligence collection. The modular design and sophisticated evasion techniques, such as obfuscation and anti-detection methods, demonstrate APT28’s evolving tactics to maintain long-term access and intelligence gathering capabilities. The campaign aligns with previously documented APT28 operations but introduces new technical innovations, highlighting the threat actor’s continuous adaptation. Indicators of compromise include multiple IP addresses, file hashes, and malicious domains linked to the toolkit’s infrastructure. Although no widespread exploitation has been reported, the threat remains active and targeted, primarily against Ukrainian government webmail systems.

Potential Impact

The impact of Operation Roundish on targeted organizations, especially government entities in Ukraine, is substantial. Successful exploitation allows attackers to harvest user credentials, including 2FA secrets, enabling unauthorized access to sensitive email accounts. This access facilitates persistent mail forwarding and bulk exfiltration of confidential communications, undermining confidentiality and potentially exposing classified or sensitive government information. Theft of address book data can lead to further spear-phishing campaigns and lateral movement within networks. The use of CSS-based side-channel attacks and browser credential theft represents a sophisticated method to bypass conventional security controls, increasing the difficulty of detection and remediation. For organizations worldwide using Roundcube webmail, especially those with similar configurations or vulnerabilities, there is a risk of similar exploitation if the toolkit or its variants are adapted. The campaign’s focus on long-term intelligence gathering and evasion techniques means compromised systems may remain under attacker control for extended periods, amplifying the potential damage. Additionally, the targeting of government entities in a geopolitically sensitive region underscores the threat’s strategic importance and potential to disrupt governmental operations and national security.

Mitigation Recommendations

1. Conduct a thorough security audit of all Roundcube webmail installations, focusing on patching known vulnerabilities and applying the latest security updates. 2. Implement strict input validation and output encoding to prevent XSS and CSS injection attacks, including Content Security Policy (CSP) headers to restrict script execution. 3. Monitor mail server logs and user activity for signs of unusual mail forwarding rules, bulk email exfiltration, or unauthorized access attempts. 4. Deploy multi-factor authentication solutions that are resistant to credential theft, such as hardware tokens or FIDO2, and regularly review 2FA configurations. 5. Use endpoint detection and response (EDR) tools to identify and block Go-based implants and other malicious payloads. 6. Restrict access to webmail administration interfaces and enforce strong authentication and network segmentation. 7. Regularly update and audit DNS and domain name system configurations to detect and block malicious domains related to the threat. 8. Educate users on phishing risks and suspicious email indicators, especially in high-risk environments. 9. Employ threat intelligence feeds to detect and block known indicators of compromise (IOCs) such as IP addresses, hashes, and domains associated with Operation Roundish. 10. Establish incident response plans tailored to webmail compromise scenarios to enable rapid containment and remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://hunt.io/blog/operation-roundish-apt28-roundcube-exploitation"]
Adversary
APT28
Pulse Id
69ba83b93cb449af00474243
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip203.161.50.145
ip106.51.89.49
ip217.146.67.241

Hash

ValueDescriptionCopy
hash4b3e139c122df9fbc08442b7823ebde9
hashe76f54b7b98ba3a08f39392e6886a9cb
hash743f7ad2d7802a1f951899d6175df69622e51846
hashdc2983fbc868097c78f5bccea43eb5ac4b81aaf6
hashe76f54b7b98ba3a08f39392e6886a9cb3e97d57b8a076e6b948968d0be392ed8

Url

ValueDescriptionCopy
urlhttp://zhblz.com/zJ2w9x

Domain

ValueDescriptionCopy
domainzhblz.com
domaina.zhblz.com
domainblog.pentagonteam.com
domaindocs.goog1e.com.spreadsheets.d.1ipevana4hglaeksstshboujdk.zhblz.com

Threat ID: 69ba88a2771bdb17497e4f5a

Added to database: 3/18/2026, 11:12:34 AM

Last enriched: 3/18/2026, 11:28:00 AM

Last updated: 3/19/2026, 4:17:47 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses