₪ Welcome to Inviteshop.us trackers shop ₪

InviteShop - #To Buy , Trade , Sell Or Find Free Trackers Invites! Here you can buy private torrent tracker invites such as HDBits.org, Morethan.tv, PassThePopcorn, BroadcasTheNet , Art Of Misdirection ( AOM ) , BeyonHD , FSC , NZBs.in , Omgwtfnzbs , Karagarga , DB9 , GazelleGames , Thevault.click , Theoccult.click , Animebytes , MagicTorrents , SceneHD , TTG , Bibliotik , Redacted , Exigomusic , + more.

If you want to buy a tracker, you can see my contact information here:
Email: inviteshop52@gmail.com
My Discord: inviteshop. or inviteshop
Skype: https://join.skype.com/invite/BsB4uGwVTfPD
Skype Name: InviteShopStore
Telegram trackers shop: https://t.me/InviteShQp
Telegram Username: @InviteShQp

Check out my trackers store by clicking on the BIG SALE image.


The best payment mod we accept!

Or Register
https://join.skype.com/ExtraeOlbK0g Skype Name: InviteShopStore
Email: inviteshop52@gmail.com Telegram Username: @InviteShQp

Phishing campaign steals accounts for Zimbra email servers worlwide

Inviteshop

₪ Owner -> Big Seller ₪
Staff member
Admin / Sysop
Posts
10,811
Posts Power
10,811.0%
Liked
890
Joined
Jan 2, 1996
Website
inviteshop.us
An ongoing phishing campaign has been underway since at least April 2023 that attempts to steal credentials for Zimbra Collaboration email servers worldwide.

According to a report by ESET, phishing emails are sent to organizations worldwide, with no specific focus on certain organizations or sectors. The threat actor behind this operation remains unknown at this time.

Targets heatmap

Pretending to be Zimbra admins

According to the ESET researchers, the attacks start with a phishing email pretending to be from an organization's admin informing users of an imminent email server update, which will result in temporary account deactivation.

The recipient is requested to open an attached HTML file to learn more about the server upgrade and review instructions on avoiding the deactivation of accounts.

Phishing email content

When opening the HTML attachment, a fake Zimbra login page will be shown that features the targeted company's logo and brand to appear authentic to the targets.

Also, the username field in the login form will be prefilled, further lending legitimacy to the phishing page.

Zimbra phishing page

Account passwords entered in the phishing form are sent to the threat actor's server via an HTTPS POST request.

Code that exfiltrates user input

ESET reports that in some instances, the attackers use compromised administrator accounts to create new mailboxes that are used for disseminating phishing emails to other members of the organization.

The analysts underline that despite the lack of sophistication for this campaign, its spread and success are impressive, and users of Zimbra Collaboration should be aware of the threat.

Zimbra servers under fire

Hackers commonly target Zimbra Collaboration email servers for cyber espionage to collect internal communications or use them as an initial point of breach to spread to the target organization's network.

Earlier this year, Proofpoint revealed that the Russian 'Winter Vivern' hacking group exploited a Zimbra Collaboration flaw (CVE-2022-27926) to access the webmail portals of NATO-aligned organizations, governments, diplomats, and military personnel.

Last year, Volexity reported that a threat actor named 'TEMP_Heretic' leveraged a then zero-day flaw (CVE-2022-23682) in the Zimbra Collaboration product to access mailboxes and perform lateral phishing attacks.

"The popularity of Zimbra Collaboration among organizations expected to have lower IT budgets ensures that it stays an attractive target for adversaries," concludes ESET.
 
Top Bottom