UNC1151 exploiting Roundcube to steal user credentials in a spearphishing campaign
The UNC1151 threat actor is exploiting a critical vulnerability (CVE-2024-42009) in the Roundcube webmail client through a spearphishing campaign targeting primarily Polish organizations. Malicious JavaScript embedded in phishing emails installs a stealthy Service Worker in victims' browsers upon simply opening the email, intercepting login credentials and exfiltrating them to attacker-controlled infrastructure without further user interaction. A second vulnerability (CVE-2025-49113) may be chained to increase persistence and impact. Stolen credentials enable attackers to access mailboxes, harvest address books, and propagate phishing internally, facilitating lateral movement. The attack bypasses many traditional endpoint defenses and is difficult to detect due to the abuse of browser Service Workers. The campaign also threatens neighboring Central European countries with significant Roundcube deployments. Organizations are urged to patch vulnerabilities, monitor for unusual Service Worker activity, enforce multi-factor authentication, and enhance email filtering to mitigate risks.
AI Analysis
Technical Summary
This spearphishing campaign by the UNC1151 threat actor exploits CVE-2024-42009, a critical vulnerability in the Roundcube webmail client, to execute malicious JavaScript embedded in phishing emails. When a victim opens the email, the script silently installs a Service Worker in the victim’s browser, which intercepts login credentials entered into Roundcube and exfiltrates them to attacker-controlled servers without requiring additional user interaction. This stealthy technique leverages browser Service Workers (T1059.007) to bypass many traditional security controls and endpoint defenses, complicating detection and response efforts. Additionally, a second vulnerability, CVE-2025-49113, may be chained with CVE-2024-42009 to enhance persistence and attack impact, potentially allowing attackers to maintain longer-term access or escalate privileges. After credential theft, UNC1151 accesses compromised mailboxes to analyze email contents, extract address books, and send further phishing emails internally, enabling lateral movement and expanding their foothold within targeted organizations. The campaign primarily targets Polish organizations but also poses a threat to neighboring Central European countries with significant Roundcube usage, including Germany, Czech Republic, Slovakia, Austria, and Hungary. Indicators of compromise include specific IP addresses, domains, URLs, and file hashes linked to the campaign. The attack’s stealth and automation amplify its potential impact across affected organizations.
Potential Impact
This campaign threatens the confidentiality, integrity, and availability of email communications for organizations in Poland and neighboring Central European countries. Compromise of user credentials can lead to unauthorized access to sensitive corporate and governmental emails, intellectual property, and personally identifiable information. The attackers’ ability to harvest address books and propagate phishing internally increases the risk of widespread compromise, potentially resulting in large-scale data breaches, financial fraud, and reputational damage. The exploitation of browser Service Workers for credential interception bypasses many endpoint security measures, making detection and prevention more difficult. Given the strategic importance of email systems in business and government operations, successful exploitation could disrupt communications and trigger costly incident response and remediation efforts. Delayed patching or misconfigured Roundcube deployments increase exposure. The campaign’s stealth and automation amplify its potential impact across affected organizations.
Mitigation Recommendations
1. Immediately apply all available security patches for Roundcube addressing CVE-2024-42009 and CVE-2025-49113; monitor official Roundcube channels for updates. 2. Conduct detailed log analysis focusing on unusual Service Worker registrations, anomalous login attempts, and outbound connections to known malicious IPs and domains associated with UNC1151. 3. Implement browser security policies to restrict or monitor Service Worker registrations in corporate environments, especially where Roundcube webmail is accessed. 4. Enhance email filtering and spearphishing detection capabilities using threat intelligence feeds containing UNC1151 indicators to block malicious emails before delivery. 5. Enforce multi-factor authentication (MFA) for all webmail access to mitigate the impact of credential theft. 6. Educate users about spearphishing risks, emphasizing that merely opening an email can trigger exploitation, and encourage prompt reporting of suspicious emails. 7. Segment email infrastructure and restrict internal email forwarding to limit phishing propagation within organizations. 8. Regularly audit mailbox and address book permissions to minimize data exposure if accounts are compromised. 9. Monitor network traffic for suspicious activity related to known attacker infrastructure and indicators of compromise. 10. Deploy endpoint detection tools capable of identifying abnormal Service Worker behavior and browser-based threats.
Affected Countries
Poland, Germany, Czech Republic, Slovakia, Austria, Hungary
Indicators of Compromise
- cve: CVE-2024-42009
- cve: CVE-2025-49113
- hash: 70cea07c972a30597cda7a1d3cd4cd8f75acad75940ca311a5a2033e6a1dd149
- ip: 2001:67c:e60:c0c:192:42:116:216
- domain: a.mpk-krakow.pl
- url: https://a.mpk-krakow.pl/creds
UNC1151 exploiting Roundcube to steal user credentials in a spearphishing campaign
Description
The UNC1151 threat actor is exploiting a critical vulnerability (CVE-2024-42009) in the Roundcube webmail client through a spearphishing campaign targeting primarily Polish organizations. Malicious JavaScript embedded in phishing emails installs a stealthy Service Worker in victims' browsers upon simply opening the email, intercepting login credentials and exfiltrating them to attacker-controlled infrastructure without further user interaction. A second vulnerability (CVE-2025-49113) may be chained to increase persistence and impact. Stolen credentials enable attackers to access mailboxes, harvest address books, and propagate phishing internally, facilitating lateral movement. The attack bypasses many traditional endpoint defenses and is difficult to detect due to the abuse of browser Service Workers. The campaign also threatens neighboring Central European countries with significant Roundcube deployments. Organizations are urged to patch vulnerabilities, monitor for unusual Service Worker activity, enforce multi-factor authentication, and enhance email filtering to mitigate risks.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This spearphishing campaign by the UNC1151 threat actor exploits CVE-2024-42009, a critical vulnerability in the Roundcube webmail client, to execute malicious JavaScript embedded in phishing emails. When a victim opens the email, the script silently installs a Service Worker in the victim’s browser, which intercepts login credentials entered into Roundcube and exfiltrates them to attacker-controlled servers without requiring additional user interaction. This stealthy technique leverages browser Service Workers (T1059.007) to bypass many traditional security controls and endpoint defenses, complicating detection and response efforts. Additionally, a second vulnerability, CVE-2025-49113, may be chained with CVE-2024-42009 to enhance persistence and attack impact, potentially allowing attackers to maintain longer-term access or escalate privileges. After credential theft, UNC1151 accesses compromised mailboxes to analyze email contents, extract address books, and send further phishing emails internally, enabling lateral movement and expanding their foothold within targeted organizations. The campaign primarily targets Polish organizations but also poses a threat to neighboring Central European countries with significant Roundcube usage, including Germany, Czech Republic, Slovakia, Austria, and Hungary. Indicators of compromise include specific IP addresses, domains, URLs, and file hashes linked to the campaign. The attack’s stealth and automation amplify its potential impact across affected organizations.
Potential Impact
This campaign threatens the confidentiality, integrity, and availability of email communications for organizations in Poland and neighboring Central European countries. Compromise of user credentials can lead to unauthorized access to sensitive corporate and governmental emails, intellectual property, and personally identifiable information. The attackers’ ability to harvest address books and propagate phishing internally increases the risk of widespread compromise, potentially resulting in large-scale data breaches, financial fraud, and reputational damage. The exploitation of browser Service Workers for credential interception bypasses many endpoint security measures, making detection and prevention more difficult. Given the strategic importance of email systems in business and government operations, successful exploitation could disrupt communications and trigger costly incident response and remediation efforts. Delayed patching or misconfigured Roundcube deployments increase exposure. The campaign’s stealth and automation amplify its potential impact across affected organizations.
Mitigation Recommendations
1. Immediately apply all available security patches for Roundcube addressing CVE-2024-42009 and CVE-2025-49113; monitor official Roundcube channels for updates. 2. Conduct detailed log analysis focusing on unusual Service Worker registrations, anomalous login attempts, and outbound connections to known malicious IPs and domains associated with UNC1151. 3. Implement browser security policies to restrict or monitor Service Worker registrations in corporate environments, especially where Roundcube webmail is accessed. 4. Enhance email filtering and spearphishing detection capabilities using threat intelligence feeds containing UNC1151 indicators to block malicious emails before delivery. 5. Enforce multi-factor authentication (MFA) for all webmail access to mitigate the impact of credential theft. 6. Educate users about spearphishing risks, emphasizing that merely opening an email can trigger exploitation, and encourage prompt reporting of suspicious emails. 7. Segment email infrastructure and restrict internal email forwarding to limit phishing propagation within organizations. 8. Regularly audit mailbox and address book permissions to minimize data exposure if accounts are compromised. 9. Monitor network traffic for suspicious activity related to known attacker infrastructure and indicators of compromise. 10. Deploy endpoint detection tools capable of identifying abnormal Service Worker behavior and browser-based threats.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://cert.pl/en/posts/2025/06/unc1151-campaign-roundcube"]
- Adversary
- UNC1151
- Pulse Id
- 68421bec34b6f0d3020dde66
- Threat Score
- null
Indicators of Compromise
Cve
| Value | Description | Copy |
|---|---|---|
cveCVE-2024-42009 | — | |
cveCVE-2025-49113 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash70cea07c972a30597cda7a1d3cd4cd8f75acad75940ca311a5a2033e6a1dd149 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip2001:67c:e60:c0c:192:42:116:216 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaina.mpk-krakow.pl | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://a.mpk-krakow.pl/creds | — |
Threat ID: 684298b5182aa0cae2059206
Added to database: 6/6/2025, 7:28:53 AM
Last enriched: 2/26/2026, 7:15:20 AM
Last updated: 3/24/2026, 7:57:30 AM
Views: 109
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.