eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

217
active users

#webmail

2 posts2 participants0 posts today
Replied in thread

@alainmi11

J'ai toujours une boîte GMail que je travaille à abandonner (dur après de nombreuses années d'utilisation), et j'ai eu la trouille.

Mais si je comprends bien, cette annonce concerne uniquement l'application mobile GMail.

Donc aucun « problème » de ce type en utilisant sporadiquement le #webmail et, la plupart du temps, l'excellent #Thunderbird (et on me dit que #FairEmail est très bien aussi — et il y a plein d'autres possibilités, par exemple : search.f-droid.org/?q=mail)

search.f-droid.orgF-Droid Search: mail

Operation RoundPress targeting high-value webmail servers

ESET researchers have uncovered a Russia-aligned espionage operation named RoundPress, targeting high-value webmail servers through XSS vulnerabilities. The campaign, attributed to the Sednit group, aims to steal confidential data from specific email accounts. Initially focused on Roundcube in 2023, the operation expanded to include Horde, MDaemon, and Zimbra in 2024. The attackers exploit various vulnerabilities, including a zero-day in MDaemon, to inject malicious JavaScript code into victims' webmail pages. Targets include governmental entities and defense companies in Eastern Europe, with some victims in Africa, Europe, and South America. The malware, known as SpyPress, can steal webmail credentials, exfiltrate contacts and email messages, and in some cases, bypass two-factor authentication.

Pulse ID: 6829772f15beb81385e3cc8d
Pulse Link: otx.alienvault.com/pulse/68297
Pulse Author: AlienVault
Created: 2025-05-18 05:59:11

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Operation RoundPress targeting high-value webmail servers

Operation RoundPress is a Russia-aligned espionage campaign targeting webmail servers through XSS vulnerabilities. The attackers, believed to be the Sednit group, use spearphishing emails to exploit vulnerabilities in Roundcube, Horde, MDaemon, and Zimbra webmail software. Their goal is to steal confidential data from specific email accounts. The operation expanded its targets in 2024, using both known and zero-day vulnerabilities. Victims include government entities and defense companies, primarily in Eastern Europe. The attackers employ various JavaScript payloads (SpyPress) to steal credentials, exfiltrate contacts and emails, and in some cases bypass two-factor authentication. The campaign demonstrates the ongoing threat to organizations with outdated webmail servers.

Pulse ID: 6825f54fbfa4e17e740f0dd6
Pulse Link: otx.alienvault.com/pulse/6825f
Pulse Author: AlienVault
Created: 2025-05-15 14:08:15

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.