Sednit abuses XSS flaws to hit gov’t entities, defense companies

Date:

Share post:

Operation RoundPress targets webmail software to steal secrets from email accounts belonging mainly to governmental organizations in Ukraine and defense contractors in the EU

ESET researchers have discovered a cyberespionage operation that abuses cross-site scripting (XSS) vulnerabilities, including a zero-day XSS flaw in MDaemon webmail software, to steal confidential information from specific email accounts belonging to officials working for various governmental organizations in Ukraine and defense contractors in Europe and on other continents.

Operation RoundPress, so nicknamed by ESET, is most probably the work of the Russia-aligned Sednit APT group, who first took aim at Roundcube, but later expanded its targeting to other webmail software, including Horde, MDaemon, and Zimbra. In some cases, the attackers even circumvented two-factor (2FA) authentication.

What else is there to know about the operation’s tactics, techniques, and procedures? Learn from ESET Chief Security Evangelist Tony Anscombe in the video and make sure to read the full blogpost.

Connect with us on Facebook, X, LinkedIn and Instagram.



Source link

spot_img

Related articles

Use AirPlay to Mirror or Extend Your Mac’s Display

Apple’s AirPlay is one of those low-level technologies that’s more capable than many people realize. In addition to...

How to Create a Seamless Registration Experience for Any Event

A cumbersome registration process can deter potential attendees, leading to significant drop-off rates. Studies indicate that approximately 27%...

OpenAI’s planned data center in Abu Dhabi would be bigger than Monaco

OpenAI is poised to help develop a staggering 5-gigawatt data center campus in Abu Dhabi, positioning the company...