Skip to main content

Operation RoundPress targeting high-value webmail servers

Medium
Published: Sun May 18 2025 (05/18/2025, 05:59:11 UTC)
Source: AlienVault OTX

Description

ESET researchers have uncovered a Russia-aligned espionage operation named RoundPress, targeting high-value webmail servers through XSS vulnerabilities. The campaign, attributed to the Sednit group, aims to steal confidential data from specific email accounts. Initially focused on Roundcube in 2023, the operation expanded to include Horde, MDaemon, and Zimbra in 2024. The attackers exploit various vulnerabilities, including a zero-day in MDaemon, to inject malicious JavaScript code into victims' webmail pages. Targets include governmental entities and defense companies in Eastern Europe, with some victims in Africa, Europe, and South America. The malware, known as SpyPress, can steal webmail credentials, exfiltrate contacts and email messages, and in some cases, bypass two-factor authentication.

AI-Powered Analysis

AILast updated: 06/19/2025, 17:50:14 UTC

Technical Analysis

Operation RoundPress is a sophisticated espionage campaign attributed to the Russia-aligned threat actor group Sednit, targeting high-value webmail servers primarily used by governmental and defense sector entities. The operation exploits cross-site scripting (XSS) vulnerabilities in popular webmail platforms, including Roundcube, Horde, MDaemon, and Zimbra. Initially observed in 2023 focusing on Roundcube, the campaign expanded in 2024 to target additional webmail software, leveraging multiple vulnerabilities, notably including a zero-day in MDaemon (CVE-2023-23397) and other CVEs such as CVE-2023-43770 and CVE-2024-11182. The attackers inject malicious JavaScript code into the webmail interface, enabling the SpyPress malware to stealthily harvest sensitive information. This includes stealing webmail credentials, exfiltrating contacts and email messages, and in some cases bypassing two-factor authentication mechanisms, significantly increasing the risk of unauthorized access and data compromise. The operation's targeting of governmental and defense organizations in Eastern Europe, with additional victims in Africa, Europe, and South America, indicates a strategic focus on high-value intelligence collection. The exploitation method relies on injecting malicious scripts via XSS vulnerabilities, which do not require initial authentication but do require the victim to access the compromised webmail interface, making user interaction a factor. Despite the medium severity rating assigned, the presence of zero-day exploits and the ability to bypass two-factor authentication elevate the technical sophistication and potential impact of this threat. No known public exploits have been reported yet, but the active targeting and use of zero-days underscore the urgency for affected organizations to implement mitigations promptly.

Potential Impact

For European organizations, particularly those in the governmental and defense sectors, Operation RoundPress poses a significant threat to confidentiality and integrity of sensitive communications. Successful exploitation can lead to credential theft, unauthorized access to email accounts, exfiltration of confidential correspondence and contact lists, and potential lateral movement within networks. The ability to bypass two-factor authentication further exacerbates the risk, undermining a critical security control. This can result in espionage, loss of intellectual property, exposure of classified information, and reputational damage. The disruption to availability is less direct but could occur if attackers leverage access for further attacks or sabotage. The targeting of webmail platforms widely used in Europe means that organizations relying on these services could face increased risk of compromise, especially if patches or mitigations are not applied swiftly. The espionage nature of the campaign suggests long-term persistence and stealthy data exfiltration, complicating detection and response efforts.

Mitigation Recommendations

Conduct immediate security assessments of webmail platforms (Roundcube, Horde, MDaemon, Zimbra) to identify and remediate XSS vulnerabilities, prioritizing the application of patches or vendor updates addressing CVE-2023-23397, CVE-2023-43770, CVE-2024-11182, and CVE-2024-27443. Implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized JavaScript within webmail interfaces, mitigating the impact of XSS attacks. Deploy Web Application Firewalls (WAFs) with tailored rules to detect and block malicious script injections targeting webmail portals. Enhance monitoring and logging of webmail access patterns to detect anomalous behavior indicative of credential theft or session hijacking. Enforce multi-factor authentication methods that are resistant to bypass techniques, such as hardware tokens or app-based authenticators with phishing-resistant protocols (e.g., FIDO2/WebAuthn). Conduct user awareness training focused on recognizing suspicious webmail behavior and phishing attempts that could facilitate exploitation. Isolate and segment webmail servers within the network to limit lateral movement in case of compromise. Regularly review and audit webmail server configurations and third-party plugins to minimize attack surface. Engage in threat intelligence sharing with relevant European cybersecurity agencies to stay informed about emerging indicators of compromise related to Operation RoundPress.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.welivesecurity.com/en/eset-research/operation-roundpress/"]
Adversary
Sednit

Indicators of Compromise

Ip

ValueDescriptionCopy
ip185.195.237.106
ip111.90.151.167
ip45.138.87.250
ip91.237.124.153
ip91.237.124.164

Cve

ValueDescriptionCopy
cveCVE-2023-23397
cveCVE-2023-43770
cveCVE-2024-11182
cveCVE-2024-27443

Domain

ValueDescriptionCopy
domainceriossl.info
domainglobal-world-news.net
domainhfuu.de
domainhijx.xyz
domainikses.net
domainjiaw.shop
domainlsjb.digital
domainraxia.top
domaintgh24.xyz
domainvictim.org
domainterembg.com
domainskiff.com

Threat ID: 682c992c7960f6956616a06e

Added to database: 5/20/2025, 3:01:00 PM

Last enriched: 6/19/2025, 5:50:14 PM

Last updated: 8/18/2025, 11:30:06 PM

Views: 31

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats