Russian APT28 Exploits Zimbra XSS Flaw in Phishing Campaign Against Ukraine

APT28 Suspected of Exploiting Zimbra Vulnerability (CVE-2025-66376) to Target Ukrainian Government

HIGH
March 8, 2026
4m read
Threat ActorPhishingCyberattack

Related Entities

Threat Actors

Organizations

Ukraine's State Hydrology AgencyCISA Seqrite Labs

Products & Tech

CVE Identifiers

CVE-2025-66376
HIGH

Full Report

Executive Summary

A sophisticated phishing campaign attributed to the Russian advanced persistent threat group APT28 (also known as Fancy Bear) is actively exploiting a high-severity vulnerability in the Zimbra Collaboration suite. The attackers are leveraging a stored cross-site scripting (XSS) flaw, tracked as CVE-2025-66376, to target Ukrainian government organizations. The attack is initiated via a specially crafted email that contains the entire exploit payload within its HTML body. When viewed in a vulnerable Zimbra webmail client, the payload executes, stealing session cookies, credentials, and other sensitive data. The campaign's TTPs are consistent with previous Russian state-sponsored activity, and CISA has added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog.

Threat Overview

  • Threat Actor: Suspected to be APT28 (Fancy Bear, Sofacy, STRONTIUM)
  • Target: Ukrainian government organizations, specifically Ukraine's State Hydrology Agency.
  • Vulnerability: CVE-2025-66376 - A high-severity stored XSS vulnerability in Zimbra Collaboration.
  • Attack Vector: A specialized phishing email that triggers the exploit upon being opened or previewed.

Technical Analysis

This attack is notable for its self-contained nature, avoiding traditional malicious links or attachments that are more easily flagged by security filters.

  1. Initial Access - T1566.002 - Spearphishing Link: Although there's no visible link, the attack is a form of spearphishing. The attacker sends a carefully crafted email to a target using a vulnerable version of Zimbra.
  2. Execution - T1059.007 - JavaScript: The email's HTML body contains malicious JavaScript. Due to the stored XSS vulnerability (CVE-2025-66376), the Zimbra web client improperly processes this HTML and executes the embedded script in the context of the user's session.
  3. Credential Access & Collection - T1539 - Steal Web Session Cookie: Once executed, the JavaScript payload acts to steal sensitive information from the user's browser session. This includes:
    • Session cookies and access tokens, allowing the attacker to hijack the user's logged-in session.
    • Credentials stored in the browser.
    • Two-factor authentication data.
  4. Exfiltration - T1048 - Exfiltration Over Alternative Protocol: The stolen data is then exfiltrated to two command-and-control (C2) domains that were set up by the attackers in late January.

This technique is highly effective because it bypasses many standard email security checks that look for suspicious attachments or URLs. The malicious content is delivered directly within the body of the email.

Impact Assessment

  • Espionage and Intelligence Gathering: The primary goal of this campaign is espionage. By hijacking the email accounts of government officials, the attackers can access sensitive communications, documents, and contact lists, providing valuable intelligence.
  • Further Compromise: A compromised email account is a powerful pivot point. Attackers can use it to launch further phishing attacks against internal and external contacts, leveraging the trust associated with the legitimate account.
  • Data Theft: The attackers can exfiltrate the entire contents of the victim's mailbox, leading to a significant data breach.

Cyber Observables for Detection

  • Network Traffic: Monitor for outbound connections from endpoints to the known C2 domains established by the attackers.
  • Web Server Logs: On the Zimbra server, look for suspicious POST requests that contain JavaScript or HTML tags, which could indicate attempts to inject the malicious payload.
  • Endpoint Monitoring: While difficult, advanced endpoint tools might detect the browser process making unexpected outbound connections after rendering an email.
  • Email Content Scanning: Advanced email gateways with HTML sandboxing or deep content inspection may be able to identify the malicious JavaScript constructs within the email body.

Detection & Response

  1. Patch Zimbra Servers: The most critical action is to patch all Zimbra Collaboration servers to a version that remediates CVE-2025-66376.
  2. Hunt for Compromise: Review logs for any communication with the attacker's C2 infrastructure. If any is found, assume the corresponding user accounts are compromised.
  3. Remediate Compromised Accounts: For any potentially compromised accounts, immediately expire all active sessions, force a password reset, and revoke any application-specific tokens or access keys.
  4. Block C2 Domains: Ensure that the known C2 domains are blocked at the network perimeter (firewall, DNS filter, web proxy).

Mitigation

  1. Patch Management: Maintain a rigorous patch management program for all internet-facing applications, especially email servers like Zimbra. This is the primary defense against this attack (M1051 - Update Software).
  2. Web Application Firewall (WAF): A properly configured WAF in front of the Zimbra web client could potentially detect and block the malicious XSS payloads before they reach the server.
  3. User Training: While this attack is sophisticated, training users to be suspicious of unexpected emails, even those without obvious links or attachments, remains a valuable layer of defense (M1017 - User Training).
  4. MFA: Enforce multi-factor authentication on all email accounts. While the script aims to steal 2FA data, robust MFA can still make it more difficult for attackers to maintain persistent access to a hijacked session.

Timeline of Events

1
March 8, 2026
This article was published

MITRE ATT&CK Mitigations

Patching the Zimbra Collaboration suite to a non-vulnerable version is the most effective way to prevent exploitation of CVE-2025-66376.

Mapped D3FEND Techniques:

Using a Web Application Firewall (WAF) to inspect incoming requests to the Zimbra server can help filter out malicious XSS payloads.

Mapped D3FEND Techniques:

Training users to be cautious about all unexpected emails, even those from known senders, can help reduce the risk of them opening malicious content.

D3FEND Defensive Countermeasures

The definitive countermeasure against the exploitation of CVE-2025-66376 is to apply the relevant security patches to the Zimbra Collaboration suite immediately. Given that this vulnerability is being actively exploited by a sophisticated threat actor (APT28) and is listed on the CISA KEV catalog, patching should be treated as an emergency. Administrators of Zimbra servers must identify all vulnerable instances within their environment and deploy the update without delay. This action directly closes the stored XSS vulnerability, preventing the malicious JavaScript payload from executing when an email is opened. Post-patching, it is crucial to verify that the update was successful and to begin hunting for any signs of prior compromise.

As a compensating control and defense-in-depth measure, organizations should deploy a Web Application Firewall (WAF) in front of their Zimbra webmail servers. The WAF should be configured with a ruleset specifically designed to detect and block Cross-Site Scripting (XSS) attacks. These rules can identify and sanitize or block inbound emails or HTTP requests containing suspicious HTML tags, such as <script>, or other common XSS payloads. While APT28 may use obfuscation to bypass simple filters, a well-configured WAF with up-to-date signatures can significantly increase the difficulty for the attacker and may block the exploit attempt before it ever reaches the vulnerable Zimbra application. This provides a critical layer of protection, especially in scenarios where immediate patching is not feasible.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

APT28Fancy BearRussiaUkraineZimbraXSSVulnerabilityPhishingEspionage

📢 Share This Article

Help others stay informed about cybersecurity threats