A sophisticated phishing campaign attributed to the Russian advanced persistent threat group APT28 (also known as Fancy Bear) is actively exploiting a high-severity vulnerability in the Zimbra Collaboration suite. The attackers are leveraging a stored cross-site scripting (XSS) flaw, tracked as CVE-2025-66376, to target Ukrainian government organizations. The attack is initiated via a specially crafted email that contains the entire exploit payload within its HTML body. When viewed in a vulnerable Zimbra webmail client, the payload executes, stealing session cookies, credentials, and other sensitive data. The campaign's TTPs are consistent with previous Russian state-sponsored activity, and CISA has added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog.
CVE-2025-66376 - A high-severity stored XSS vulnerability in Zimbra Collaboration.This attack is notable for its self-contained nature, avoiding traditional malicious links or attachments that are more easily flagged by security filters.
T1566.002 - Spearphishing Link: Although there's no visible link, the attack is a form of spearphishing. The attacker sends a carefully crafted email to a target using a vulnerable version of Zimbra.T1059.007 - JavaScript: The email's HTML body contains malicious JavaScript. Due to the stored XSS vulnerability (CVE-2025-66376), the Zimbra web client improperly processes this HTML and executes the embedded script in the context of the user's session.T1539 - Steal Web Session Cookie: Once executed, the JavaScript payload acts to steal sensitive information from the user's browser session. This includes:T1048 - Exfiltration Over Alternative Protocol: The stolen data is then exfiltrated to two command-and-control (C2) domains that were set up by the attackers in late January.This technique is highly effective because it bypasses many standard email security checks that look for suspicious attachments or URLs. The malicious content is delivered directly within the body of the email.
CVE-2025-66376.M1051 - Update Software).M1017 - User Training).Patching the Zimbra Collaboration suite to a non-vulnerable version is the most effective way to prevent exploitation of CVE-2025-66376.
Mapped D3FEND Techniques:
Using a Web Application Firewall (WAF) to inspect incoming requests to the Zimbra server can help filter out malicious XSS payloads.
Mapped D3FEND Techniques:
Training users to be cautious about all unexpected emails, even those from known senders, can help reduce the risk of them opening malicious content.
The definitive countermeasure against the exploitation of CVE-2025-66376 is to apply the relevant security patches to the Zimbra Collaboration suite immediately. Given that this vulnerability is being actively exploited by a sophisticated threat actor (APT28) and is listed on the CISA KEV catalog, patching should be treated as an emergency. Administrators of Zimbra servers must identify all vulnerable instances within their environment and deploy the update without delay. This action directly closes the stored XSS vulnerability, preventing the malicious JavaScript payload from executing when an email is opened. Post-patching, it is crucial to verify that the update was successful and to begin hunting for any signs of prior compromise.
As a compensating control and defense-in-depth measure, organizations should deploy a Web Application Firewall (WAF) in front of their Zimbra webmail servers. The WAF should be configured with a ruleset specifically designed to detect and block Cross-Site Scripting (XSS) attacks. These rules can identify and sanitize or block inbound emails or HTTP requests containing suspicious HTML tags, such as <script>, or other common XSS payloads. While APT28 may use obfuscation to bypass simple filters, a well-configured WAF with up-to-date signatures can significantly increase the difficulty for the attacker and may block the exploit attempt before it ever reaches the vulnerable Zimbra application. This provides a critical layer of protection, especially in scenarios where immediate patching is not feasible.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats