
ESET researchers identified a new phishing campaign that aims to steal the credentials of Zimbra email accounts.
According to the researchers, the campaign started in April this year and is still actively spreading, mainly targeting small to medium businesses and governmental institutions. The biggest number of targets in have been in Poland, Ecuador, and Italy. So far, the threat actors responsible for the attacks have not been identified.
Zimbra Collaboration is an open-core collaborative software platform providing an email server and a web client. The service is used by more than 200,000 businesses worldwide.
Malicious HTML attachment
At the core of the phishing campaign is a malicious email with an HTML attachment that appears to be an email from a server administrator.
The email warns the target about an email server update, account deactivation, or similar issue, and directs the user to click on the attached file.


The HTML file opens in the victim’s browser, creating the illusion that it’s the genuine login page to Zimbra account. The login page is customized according to the targeted organization. However, the URL reveals that it points to a local file path.

In the background, the submitted credentials are collected from the HTML form and sent to a server controlled by the malicious actor.
Researchers also noticed phishing emails sent from previously targeted Zimbra accounts. This means that malicious actors might have compromised victims' administrator accounts and created additional mailboxes that have been used in phishing campaigns.
More from Cybernews:
Alarming lack of cybersecurity practices on world's most popular websites
Through A Glass Darkly: brain hacking tips for plebs and rich alike
Snapchat's AI posts an obscure story, and admits it got a bit carried away
Ransom victims less willing to pay: the five most notorious gangs
Colorado State University falls victim to Cl0p in MOVEit hack
Subscribe to our newsletter
Your email address will not be published. Required fields are marked