Danger actors working with interests aligned to Belarus and Russia have been joined to a new cyber espionage campaign that possible exploited cross-website scripting (XSS) vulnerabilities in Roundcube webmail servers to concentrate on over 80 companies.
These entities are mostly positioned in Ga, Poland, and Ukraine, according to Recorded Foreseeable future, which attributed the intrusion set to a menace actor recognized as Wintertime Vivern, which is also recognised as TA473 and UAC0114. The cybersecurity company is monitoring the hacking outfit underneath the moniker Menace Exercise Team 70 (TAG-70).
Winter season Vivern’s exploitation of security flaws in Roundcube and computer software was previously highlighted by ESET in October 2023, becoming a member of other Russia-joined threat actor teams these as APT28, APT29, and Sandworm that are known to goal email computer software.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
The adversary, which has been lively given that at minimum December 2020, has also been connected to the abuse of a now-patched vulnerability in Zimbra Collaboration email computer software final 12 months to infiltrate companies in Moldova and Tunisia in July 2023.
The campaign learned by Recorded Long run took area from the begin of October 2023 and ongoing until finally the center of the month with the objective of gathering intelligence on European political and navy activities. The attacks overlap with added TAG-70 action against Uzbekistan government mail servers that were detected in March 2023.
“TAG70 has shown a significant amount of sophistication in its attack techniques,” the company reported. “The menace actors leveraged social engineering strategies and exploited cross-internet site scripting vulnerabilities in Roundcube webmail servers to attain unauthorized entry to targeted mail servers, bypassing the defenses of government and military services corporations.”
The attack chains contain exploiting Roundcube flaws to supply JavaScript payloads that are designed to exfiltrate consumer qualifications to a command-and-handle (C2) server.
Recorded Future claimed it also discovered proof of TAG-70 focusing on the Iranian embassies in Russia and the Netherlands, as effectively as the Georgian Embassy in Sweden.
“The concentrating on of Iranian embassies in Russia and the Netherlands indicates a broader geopolitical interest in assessing Iran’s diplomatic things to do, in particular relating to its guidance for Russia in Ukraine,” it stated.
“Equally, espionage in opposition to Georgian governing administration entities demonstrates interests in monitoring Georgia’s aspirations for European Union (EU) and NATO accession.”
Discovered this report exciting? Comply with us on Twitter and LinkedIn to browse additional exceptional material we post.
Some areas of this write-up are sourced from:
thehackernews.com