Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

UNC1151 exploiting Roundcube to steal user credentials in a spearphishing campaign

0
Medium
Published: Thu Jun 05 2025 (06/05/2025, 22:36:28 UTC)
Source: AlienVault OTX General

Description

The UNC1151 threat actor is exploiting a critical vulnerability (CVE-2024-42009) in the Roundcube webmail client through a spearphishing campaign targeting primarily Polish organizations. Malicious JavaScript embedded in phishing emails installs a stealthy Service Worker in victims' browsers upon simply opening the email, intercepting login credentials and exfiltrating them to attacker-controlled infrastructure without further user interaction. A second vulnerability (CVE-2025-49113) may be chained to increase persistence and impact. Stolen credentials enable attackers to access mailboxes, harvest address books, and propagate phishing internally, facilitating lateral movement. The attack bypasses many traditional endpoint defenses and is difficult to detect due to the abuse of browser Service Workers. The campaign also threatens neighboring Central European countries with significant Roundcube deployments. Organizations are urged to patch vulnerabilities, monitor for unusual Service Worker activity, enforce multi-factor authentication, and enhance email filtering to mitigate risks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 07:15:20 UTC

Technical Analysis

This spearphishing campaign by the UNC1151 threat actor exploits CVE-2024-42009, a critical vulnerability in the Roundcube webmail client, to execute malicious JavaScript embedded in phishing emails. When a victim opens the email, the script silently installs a Service Worker in the victim’s browser, which intercepts login credentials entered into Roundcube and exfiltrates them to attacker-controlled servers without requiring additional user interaction. This stealthy technique leverages browser Service Workers (T1059.007) to bypass many traditional security controls and endpoint defenses, complicating detection and response efforts. Additionally, a second vulnerability, CVE-2025-49113, may be chained with CVE-2024-42009 to enhance persistence and attack impact, potentially allowing attackers to maintain longer-term access or escalate privileges. After credential theft, UNC1151 accesses compromised mailboxes to analyze email contents, extract address books, and send further phishing emails internally, enabling lateral movement and expanding their foothold within targeted organizations. The campaign primarily targets Polish organizations but also poses a threat to neighboring Central European countries with significant Roundcube usage, including Germany, Czech Republic, Slovakia, Austria, and Hungary. Indicators of compromise include specific IP addresses, domains, URLs, and file hashes linked to the campaign. The attack’s stealth and automation amplify its potential impact across affected organizations.

Potential Impact

This campaign threatens the confidentiality, integrity, and availability of email communications for organizations in Poland and neighboring Central European countries. Compromise of user credentials can lead to unauthorized access to sensitive corporate and governmental emails, intellectual property, and personally identifiable information. The attackers’ ability to harvest address books and propagate phishing internally increases the risk of widespread compromise, potentially resulting in large-scale data breaches, financial fraud, and reputational damage. The exploitation of browser Service Workers for credential interception bypasses many endpoint security measures, making detection and prevention more difficult. Given the strategic importance of email systems in business and government operations, successful exploitation could disrupt communications and trigger costly incident response and remediation efforts. Delayed patching or misconfigured Roundcube deployments increase exposure. The campaign’s stealth and automation amplify its potential impact across affected organizations.

Mitigation Recommendations

1. Immediately apply all available security patches for Roundcube addressing CVE-2024-42009 and CVE-2025-49113; monitor official Roundcube channels for updates. 2. Conduct detailed log analysis focusing on unusual Service Worker registrations, anomalous login attempts, and outbound connections to known malicious IPs and domains associated with UNC1151. 3. Implement browser security policies to restrict or monitor Service Worker registrations in corporate environments, especially where Roundcube webmail is accessed. 4. Enhance email filtering and spearphishing detection capabilities using threat intelligence feeds containing UNC1151 indicators to block malicious emails before delivery. 5. Enforce multi-factor authentication (MFA) for all webmail access to mitigate the impact of credential theft. 6. Educate users about spearphishing risks, emphasizing that merely opening an email can trigger exploitation, and encourage prompt reporting of suspicious emails. 7. Segment email infrastructure and restrict internal email forwarding to limit phishing propagation within organizations. 8. Regularly audit mailbox and address book permissions to minimize data exposure if accounts are compromised. 9. Monitor network traffic for suspicious activity related to known attacker infrastructure and indicators of compromise. 10. Deploy endpoint detection tools capable of identifying abnormal Service Worker behavior and browser-based threats.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://cert.pl/en/posts/2025/06/unc1151-campaign-roundcube"]
Adversary
UNC1151
Pulse Id
68421bec34b6f0d3020dde66
Threat Score
null

Indicators of Compromise

Cve

ValueDescriptionCopy
cveCVE-2024-42009
cveCVE-2025-49113

Hash

ValueDescriptionCopy
hash70cea07c972a30597cda7a1d3cd4cd8f75acad75940ca311a5a2033e6a1dd149

Ip

ValueDescriptionCopy
ip2001:67c:e60:c0c:192:42:116:216

Domain

ValueDescriptionCopy
domaina.mpk-krakow.pl

Url

ValueDescriptionCopy
urlhttps://a.mpk-krakow.pl/creds

Threat ID: 684298b5182aa0cae2059206

Added to database: 6/6/2025, 7:28:53 AM

Last enriched: 2/26/2026, 7:15:20 AM

Last updated: 3/25/2026, 4:15:47 AM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses