HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

APT28 Exploits Zimbra XSS (CVE‑2025‑66376) in Phishing Campaign Targeting Ukrainian Government

State‑backed APT28 leveraged CVE‑2025‑66376, a stored XSS in Zimbra Collaboration Suite, to deliver attachment‑free phishing emails that harvested credentials and mailbox data from Ukrainian government agencies. The exploit underscores urgent patching and third‑party email security for organizations using Zimbra.

🛡️ LiveThreat™ Intelligence · 📅 March 20, 2026· 📰 bleepingcomputer.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
4 recommended
📰
Source
bleepingcomputer.com

APT28 Exploits Zimbra XSS (CVE‑2025‑66376) in Phishing Campaign Targeting Ukrainian Government

What Happened — APT28 (Fancy Bear) leveraged a stored cross‑site scripting flaw (CVE‑2025‑66376) in the Zimbra Collaboration Suite to deliver a malicious HTML‑only phishing email. When opened in a vulnerable Zimbra webmail session, the payload executed remote code, harvested credentials, session tokens, 2FA backup codes, and mailbox contents, exfiltrating data via DNS and HTTPS.

Why It Matters for TPRM

  • Unpatched Zimbra servers expose third‑party data and credentials, creating a supply‑chain risk for any organization that relies on the platform.
  • Credential harvesting can lead to lateral movement into other vendor environments, amplifying breach impact.
  • The attack demonstrates that “attachment‑free” phishing can bypass many traditional email defenses.

Who Is Affected — Government agencies, critical infrastructure entities, and any enterprise using Zimbra Collaboration Suite (on‑prem or hosted).

Recommended Actions

  • Verify all Zimbra deployments are patched to the November 2025 release or later.
  • Enforce MFA and monitor for anomalous mailbox activity.
  • Conduct a rapid inventory of third‑party email services and assess their patch management processes.
  • Update email security rules to detect HTML‑only phishing payloads and block suspicious scripts.

Technical Notes — CVE‑2025‑66376 is a stored XSS that enables unauthenticated remote code execution. The exploit chain lives entirely within the email body; no attachments or links are present. Harvested data includes credentials, session tokens, backup 2FA codes, and up to 90 days of mailbox content, exfiltrated over DNS and HTTPS. Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/russian-apt28-military-hackers-exploit-zimbra-flaw-in-ukrainian-govt-attacks/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.