Netvora logo
Submit Startup Subscribe
Home About Contact Submit Startup Subscribe

Users of Roundcube, Horde, MDaemon, and Zimbra Fall Prey to XSS Attacks

Comment

Users of Roundcube, Horde, MDaemon, and Zimbra Fall Prey to XSS Attacks

Users of Roundcube, Horde, MDaemon, and Zimbra Fall Prey to XSS Attacks

Users of Roundcube, Horde, MDaemon, and Zimbra Fall Prey to XSS Attacks

By Netvora Tech News


Antivirus firm ESET has revealed that users of webmail services from Roundcube, Horde, MDaemon, and Zimbra have been targeted by cross-site scripting (XSS) attacks. The attacks aimed to steal login credentials, contacts, login history, and email messages. In the case of MDaemon, the attackers also attempted to steal two-factor authentication secrets.

How the Attacks Worked

The attacks began with spear-phishing emails containing malicious code. When the target opened the email, malicious JavaScript was injected into the webmail page, which stole sensitive information. The attacks were directed at governments in Africa, Europe, and South America, as well as European defense companies, according to ESET.

Timeline of the Attacks

The attacks took place in 2023 and 2024, with the last reported incident occurring in December. The vulnerabilities in Horde, Roundcube, and Zimbra were well-known and had available updates. However, not all system administrators had implemented these patches. In the case of MDaemon, no update was available at the time of the attack.

Why Webmail Servers are a Prime Target

According to ESET, webmail servers like Roundcube and Zimbra are a popular target for spy groups. "Many organizations fail to keep their webmail servers up-to-date, and since the vulnerabilities can be exploited remotely by sending an email, it's an attractive target for attackers to steal email and other sensitive information."

Prevention is Key

To prevent such attacks, it is essential to keep webmail servers up-to-date with the latest security patches and to implement robust security measures. Users should also be cautious when opening emails from unknown senders and should avoid clicking on suspicious links or downloading attachments from untrusted sources.

Comments (0)

Leave a comment

Back to homepage