{"id":18199,"date":"2022-02-04T09:10:06","date_gmt":"2022-02-04T17:10:06","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/02\/04\/news-11932\/"},"modified":"2022-02-04T09:10:06","modified_gmt":"2022-02-04T17:10:06","slug":"news-11932","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/02\/04\/news-11932\/","title":{"rendered":"Threat actor steals email with Zimbra zero-day"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Fri, 04 Feb 2022 16:07:15 +0000<\/strong><\/p>\n<p><a href=\"https:\/\/www.volexity.com\/blog\/2022\/02\/03\/operation-emailthief-active-exploitation-of-zero-day-xss-vulnerability-in-zimbra\/\" rel=\"noreferrer noopener nofollow\" target=\"_blank\">Researchers<\/a> have discovered a threat actor attempting to exploit a cross-site scripting (XSS) zero-day vulnerability in the Zimbra email platform.<\/p>\n<p>Zimbra is open source webmail application used for messaging and collaboration. Cross-site scripting is a type of\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/injection-attacks\/\">injection<\/a><a href=\"https:\/\/blog.malwarebytes.com\/glossary\/injection-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\"> attack<\/a>\u00a0wherein a vulnerability in a web application allows a\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/threat-actor\/\">threat<\/a><a href=\"https:\/\/blog.malwarebytes.com\/glossary\/threat-actor\/\" target=\"_blank\" rel=\"noreferrer noopener\"> actor<\/a>\u00a0to inject malicious code into the site\u2019s content.\u00a0In this case the target was a Zimbra <span style=\"font-size: revert;color: initial\">email opened in a web browser<\/span>.<\/p>\n<h3>Targets and threat actor<\/h3>\n<p>The entire campaign was targeted\u2014predominantly at organizations in the European government and media realm. According to Zimbra, there are 200,000 businesses, and over a thousand government and financial institutions, using their software. How many of them fall into the target audience is unknown.<\/p>\n<p>The researchers have dubbed the threat actor \u201cTEMP_Heretic\u201d and based on a number of observed factors they have reason to believe the threat actor is of Chinese origin.<\/p>\n<h3>The campaign<\/h3>\n<p>This campaign was named EmailThief by the researchers and consisted of two clear components. The first one was a reconnaissance mission to find people that were likely to open the second email. Using this method the attackers could weed out invalid and unresponsive receivers. The reconnaissance emails were sent on 14 December, 2021 and contained no malicious links. This first wave only contained embedded remote images in the body of email messages. These emails contained no content other than the remote image and had generic subjects often associated with non-targeted spam. These emails are unlikely to have attracted any negative attention because remote images are widely used in marketing emails to measure email open rates.<\/p>\n<p>The image URLs were unique to each individual, enabling the threat actor to ascertain the validity of the email addresses, and to determine which accounts were more likely to open phishing email messages.<\/p>\n<p>The second part of the campaign was only sent to the receivers that qualified as likely to open such an email in the first wave. This part of the campaign was done in four waves which were sent out at 16, 23, 24, and 27 of December, 2021. These spear-phishing waves were largely generic and mostly themed around the holiday season, notably purporting to be from various airlines or Amazon.<\/p>\n<p>In these campaigns, the attacker embedded links to attacker-controlled infrastructure. Upon clicking the malicious link, the attacker infrastructure would attempt a redirect to a page on the targeted organization\u2019s Zimbra webmail host. A specifically crafted URL format exploited a zero-day vulnerability, allowing an attacker to load arbitrary JavaScript into the page, in the context of a logged-in Zimbra session.<\/p>\n<p>The overall effect of this attack is that by getting a user to click a link in an email and leave their browser window open for any length of time, the attacker can steal the contents of their mailbox.<\/p>\n<h3>Mitigation<\/h3>\n<p>Besides the theft of mailbox contents the vulnerability could also have been used to:<\/p>\n<ul>\n<li>Exfiltrate cookies, which could allow persistent access to a mailbox<\/li>\n<li>Send phishing messages to the user&#8217;s contacts<\/li>\n<li>Display prompts to download malware from trusted websites<\/li>\n<\/ul>\n<p>At the time of writing, there is no official patch or workaround for this vulnerability, so it is a <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/04\/what-is-a-zero-day\/\">zero-day vulnerability<\/a>. The researchers have notified Zimbra of the exploit and hopefully a patch will be available soon.<\/p>\n<p>Users of Zimbra should consider upgrading to version 9.0.0, as there is currently no secure version of 8.8.15 and testing of version 9.0.0 by the researchers indicates it is likely unaffected.<\/p>\n<p>Possible workarounds are:<\/p>\n<ul>\n<li>Don\u2019t log into the Zimbra webmail client from a web browser<\/li>\n<li>The good old \u201cdon\u2019t click on links in emails\u201d advice<\/li>\n<\/ul>\n<p>Since this campaign seems to have run its course it\u2019s important for possible targets to check whether they have fallen victim to this campaign. In which case email communications may have been intercepted by the threat actor.<\/p>\n<p>The researchers have posted a full list of IOC\u2019s on <a href=\"https:\/\/github.com\/volexity\/threat-intel\/blob\/main\/2022\/2022-02-03%20Operation%20EmailThief\/indicators\/iocs.csv\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">GitHub<\/a> for your perusal.<\/p>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/02\/threat-actor-steals-email-with-zimbra-zero-day\/\">Threat actor steals email with Zimbra zero-day<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/02\/threat-actor-steals-email-with-zimbra-zero-day\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Fri, 04 Feb 2022 16:07:15 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/02\/threat-actor-steals-email-with-zimbra-zero-day\/' title='Threat actor steals email with Zimbra zero-day'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/02\/stealing_mail.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Researchers have uncovered a targeted phishing campaign exploiting a XSS zero-day vulnerability in the Zimbra email platform.<\/p>\n<p>Categories: <a href=\"https:\/\/blog.malwarebytes.com\/category\/exploits-and-vulnerabilities\/\" rel=\"category tag\">Exploits and vulnerabilities<\/a><\/p>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/emailthief\/\" rel=\"tag\">EmailThief<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/temp_heretic\/\" rel=\"tag\">TEMP_Heretic<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/xss\/\" rel=\"tag\">xss<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/zero-day-2\/\" rel=\"tag\">zero-day<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/02\/threat-actor-steals-email-with-zimbra-zero-day\/' title='Threat actor steals email with Zimbra zero-day'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/02\/threat-actor-steals-email-with-zimbra-zero-day\/\">Threat actor steals email with Zimbra zero-day<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[24825,22783,24826,15775,11524],"class_list":["post-18199","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-emailthief","tag-exploits-and-vulnerabilities","tag-temp_heretic","tag-xss","tag-zero-day"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18199"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18199\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}