21 June 2023

Russia’s APT28 breached Ukrainian orgs via RoundCube flaws


Russia’s APT28 breached Ukrainian orgs via RoundCube flaws

Russia’s GRU military hacking unit known as APT28 (Fancy Bear, Forrest Blizzard or Blue Delta) has been observed compromising government institutions and military entities involved in aircraft infrastructure in Ukraine via security flaws in vulnerable RoundCube webmail servers.

According to reports from Ukraine’s computer emergency response team (CERT-UA) and Recorded Future’s Insikt Group, the espionage campaign involved spearphishing attacks using news about Russia’s war against Ukraine to entice recipients into opening emails.

The APT28 campaign exploited three vulnerabilities in the RoundCube email software (CVE-2020-35730, CVE-2020-12641, and CVE-2021-44026) to run malicious scripts designed to perform reconnaissance on RoundCube servers, redirect incoming emails to the attacker-controlled address, collect session cookies, user information, and address books

The email attachment contained JavaScript code that executed additional JavaScript payloads from the attacker-controlled infrastructure.

Recorded Future says that this campaign was carried out by the same subgroup that abused a flaw (CVE-2023-23397) in Microsoft’s Outlook email software in targeted attacks against a limited number of organizations in government, transportation, energy, and military sectors in Europe.

In April, Ukrainian hacktivists leaked the personal information and correspondence of Lieutenant Colonel Sergey Alexandrovich Morgachev, an officer of the Russian Main Intelligence Directorate of the General Staff of the Russian Army (GRU) and a suspected leader of APT28.

In May, the same hacktivists exposed the personal information and photo of Viktor Borisovich Netyksho, an officer in Russia’s Intelligence Directorate of the General Staff (GRU) wanted in the United States for his alleged involvement in the 2016 US presidential election hack.

Back to the list

Latest Posts

Cyber Security Week in Review: September 6, 2024

Cyber Security Week in Review: September 6, 2024

In brief: the US charges Russian GRU hackers for attacks on Ukraine, Apache, Cisco, Zyxel patch high-risk flaws, Google fixes Android zero-day, and more.
6 September 2024
Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Some of the documents appeared to be part of legitimate Red Team exercises, while other were intended for malicious purposes.
5 September 2024
US seizes 32 domains linked to Russian Doppelganger influence campaign

US seizes 32 domains linked to Russian Doppelganger influence campaign

The domains, used to disseminate propaganda, were seized as part of a broader effort to disrupt Russia’s attempts to interfere in the 2024 US Presidential Election.
5 September 2024