Go to listing page

Winter Vivern APT Resurfaces to Target European Entities

Winter Vivern APT Resurfaces to Target European Entities
Russia-aligned Winter Vivern (aka TA473 and UAC-0114) is once again making headlines for targeting government organizations and think tanks in Europe. The group was found exploiting a zero-day vulnerability in the Roundcube webmail servers to compromise the targeted systems remotely.

Vulnerability in question

  • It is a Cross-Site Scripting issue (CVE-2023-5631) in RoundCube, which could be exploited remotely by sending a specially crafted email message. 
  • The vulnerability affects Roundcube versions 1.6.x before 1.6.4, 1.5.x before 1.5.5, and 1.4.x before 1.4.15.

Diving into the campaign

  • In this particular campaign, the emails were sent from the address team.managment@outlook[.]com with the subject line ‘Get started in your Outlook’. 
  • These emails included a malicious SVG file that contained a base64-encoded payload. 
  • Once the payload is decoded, it leads to the execution of JavaScript code in the victim’s browser. 
  • Surprisingly, the JavaScript injection worked even on fully patched Roundcube instances. 

Implications

  • Winter Vivern has been exploiting previously known vulnerabilities in RoundCube and Zimbra email servers as part of its infection process to launch attacks against European entities. 
  • It abused CVE-2020-35730 in RoundCube in a campaign between August and September. 

Winter Vivern's transition to abuse a zero-day vulnerability indicates that the group has stepped up its operation to infiltrate high-value targets. 

Conclusion

Despite the low sophistication of the group’s toolset, Winter Vivern remains a significant threat to organizations in Europe. Hence, it is recommended to apply the latest security patches to mitigate the risk of such attacks. Refer to IoCs containing file hashes and malicious domains to block the threat at the initial stage.
Cyware Publisher

Publisher

Cyware