Sednit abuses XSS flaws to hit gov’t entities, defense companies

Date:

Share post:

Operation RoundPress targets webmail software to steal secrets from email accounts belonging mainly to governmental organizations in Ukraine and defense contractors in the EU

ESET researchers have discovered a cyberespionage operation that abuses cross-site scripting (XSS) vulnerabilities, including a zero-day XSS flaw in MDaemon webmail software, to steal confidential information from specific email accounts belonging to officials working for various governmental organizations in Ukraine and defense contractors in Europe and on other continents.

Operation RoundPress, so nicknamed by ESET, is most probably the work of the Russia-aligned Sednit APT group, who first took aim at Roundcube, but later expanded its targeting to other webmail software, including Horde, MDaemon, and Zimbra. In some cases, the attackers even circumvented two-factor (2FA) authentication.

What else is there to know about the operation’s tactics, techniques, and procedures? Learn from ESET Chief Security Evangelist Tony Anscombe in the video and make sure to read the full blogpost.

Connect with us on Facebook, X, LinkedIn and Instagram.



Source link

spot_img

Related articles

Troy Hunt: Weekly Update 483

Building out an IoT environment is...

Marvell Shows Off Advanced Glass Packaging

Analyst Day 2025: Pretty pretty and pretty big too Marvell was showing off their packaging prowess at the most...

10 Essential Online Event Registration Tools for Your 2026 Tech Stack

Choosing the right online event registration tools can reshape your entire event program can reshape your entire event...