HomeCyber BalkansNew Wave of Attack Campaign Targeting Zimbra Email Users for Credential Theft

New Wave of Attack Campaign Targeting Zimbra Email Users for Credential Theft

Published on

spot_img


A new “mass-spreading” social engineering campaign is targeting users of the Zimbra Collaboration email server with an aim to collect their login credentials for use in follow-on operations.

The activity, active since April 2023 and still ongoing, targets a wide range of small and medium businesses and governmental entities, most of which are located in Poland, Ecuador, Mexico, Italy, and Russia. It has not been attributed to any known threat actor or group.

“Initially, the target receives an email with a phishing page in the attached HTML file,” ESET researcher Viktor Šperka said in a report. “The email warns the target about an email server update, account deactivation, or similar issue and directs the user to click on the attached file.”

The messages also spoof the from address to appear as if they are coming from a Zimbra administrator in a likely attempt to convince the recipients into opening the attachment.

The HTML file contains a Zimbra login page tailored to the targeted organization, with the Username field prefilled with the victim’s email address to make it seem more authentic. Once the credentials are entered, they are collected from the HTML form and sent via a HTTPS POST request to an actor-controlled server.

What makes the attacks stand out is their ability to propagate further. Subsequent phishing waves have leveraged accounts of previously targeted, legitimate companies, suggesting that the infiltrated administrator accounts associated with those victims were used to send emails to other entities of interest.

“One explanation is that the adversary relies on password reuse by the administrator targeted through phishing – i.e., using the same credentials for both email and administration,” Šperka noted.

While the campaign is not technically sophisticated, it banks on the fact that “HTML attachments contain legitimate code, and the only telltale element is a link pointing to the malicious host” that’s embedded in the source code.

“This way, it is much easier to circumvent reputation-based anti-spam policies, compared to phishing techniques where a malicious link is directly placed in the email body,” Šperka said.

-REFERENCE: https://thehackernews.com/2023/08/new-wave-of-attack-campaign-targeting.html 

-K.Z

 



Source link

Latest articles

CISOs Transform into Strategic Advisors for Business Risk Management

In an evolving digital landscape, experts assert that the role of Chief Information Security...

Claude Mythos – Ist der Hype berechtigt?

Expertenmeinungen zu den Fähigkeiten von Claude Mythos Die neuesten Erkenntnisse von VulnCheck häufen sich und...

JanaWare Ransomware Targets Turkish Users Through Custom Adwind RAT

A New Wave of Ransomware: The Rise of 'JanaWare' Targeting Turkey In a significant development...

Pro-Russian Threat Actors Attempt Cyberattack on Swedish Heat and Power Plant

In the spring of 2025, a significant incident occurred in western Sweden that highlighted...

More like this

CISOs Transform into Strategic Advisors for Business Risk Management

In an evolving digital landscape, experts assert that the role of Chief Information Security...

Claude Mythos – Ist der Hype berechtigt?

Expertenmeinungen zu den Fähigkeiten von Claude Mythos Die neuesten Erkenntnisse von VulnCheck häufen sich und...

JanaWare Ransomware Targets Turkish Users Through Custom Adwind RAT

A New Wave of Ransomware: The Rise of 'JanaWare' Targeting Turkey In a significant development...