Threat Advisories:
🎧 Hive Force Labs: October First Threat Research
👥 Play Count: Loading...

Zimbra Zero-Day Hidden in “Harmless” ICS File Targets Military

Red | Vulnerability Report
Download PDF

Zimbra Zero-Day Hidden in “Harmless” ICS File Targets Military

Summary

In early 2025, an unidentified threat actor impersonating the Libyan Navy’s Office of Protocol launched a sophisticated cyberattack against Brazil’s military, exploiting a zero-day vulnerability (CVE-2025-27915) in Zimbra Collaboration Suite (ZCS). The campaign weaponized a seemingly benign ICS (iCalendar) file containing malicious JavaScript, which executed upon viewing, enabling attackers to steal credentials, manipulate email communications, and exfiltrate sensitive data.

This vulnerability marks one of the first known instances of a zero-day exploit embedded in calendar files within open-source collaboration software. The flaw affects Zimbra versions 9.0, 10.0, and 10.1, allowing cross-site scripting (XSS) via improperly sanitized HTML in ICS files. Once exploited, the malware enables remote code execution within the victim’s browser session.

The attack underscores a growing trend of stealthy social engineering in targeted operations, particularly those directed at military and government entities using widely deployed open-source systems.


Vulnerability Details

The zero-day vulnerability CVE-2025-27915 is a stored cross-site scripting (XSS) flaw that enables arbitrary code execution in the Classic Web Client of Zimbra Collaboration Suite.

Attackers distributed malicious ICS attachments via spear-phishing emails disguised as calendar invites from legitimate sources. The payload exploited an ontoggle event within a <details> HTML tag, allowing JavaScript execution once the recipient viewed the file in Zimbra’s webmail interface.

Once triggered, the exploit granted full access to the victim’s Zimbra session, enabling attackers to:

  • Harvest user credentials, email messages, and contact lists.
  • Redirect communications or modify mail forwarding rules.
  • Steal and exfiltrate sensitive documents and shared folders.

The campaign exhibited advanced obfuscation techniques, including:

  • A 60-second delayed execution to evade sandbox detection.
  • Execution throttling (only once every three days).
  • Session monitoring and automated logout triggers to re-harvest credentials upon user re-login.

While attribution remains unconfirmed, the campaign’s methodology mirrors tactics previously used by Russian-linked threat actors, such as UNC1151 (Ghostwriter), known for credential theft via XSS vulnerabilities.

Vulnerability Metadata:

  • CVE ID: CVE-2025-27915
  • Vulnerability Type: Cross-Site Scripting (XSS)
  • Affected Products: Zimbra Collaboration Suite (ZCS) versions 9.0, 10.0, 10.1
  • CPE: cpe:2.3:a:zimbra:collaboration::::::::
  • CWE ID: CWE-79 (Improper Neutralization of Input During Web Page Generation)
  • Impact: Stored XSS leading to arbitrary code execution and data exfiltration

Recommendations

  • Patch Immediately: Apply Zimbra 9.0.0 P44, 10.0.13, or 10.1.5, which address CVE-2025-27915.
  • Disable Classic Web Client: Temporarily disable the Zimbra Classic interface until patching is complete.
  • Quarantine ICS Attachments: Configure mail gateways to block or sanitize ICS attachments.
  • Deprecate End-of-Life Versions:
    • ZCS 9.0 reached End of Life (EOL) on June 30, 2025.
    • ZCS 10.0 reached End of General Support the same day.
      Organizations using these versions must migrate to ZCS 10.1 or later.
  • Migrate Deprecated Platforms:
    Support for RHEL/CentOS 7 and Oracle 7 was discontinued after Zimbra 10.1.10 (July 2025).
    Move to RHEL, Rocky, or Oracle Linux 9 to ensure OS-level security compliance.
  • Monitor for Malicious Activity: Review web logs and email activity for signs of ICS-based exploitation or credential anomalies.

Indicators of Compromise (IoCs)

IPv4

  • 193[.]29[.]58[.]37

URL

  • hxxps[:]//ffrk[.]net/apache2_config_default_51_2_1

Email

  • spam_to_junk[@]proton[.]me

SHA256

  • ea752b1651ad16bc6bf058c34d6ae795d0b4068c2f48fdd7858f3d4f7c516f37

MITRE ATT&CK TTPs

  • TA0001 Initial AccessT1190 (Exploit Public-Facing Application)
  • TA0002 ExecutionT1203 (Exploitation for Client Execution), T1059, T1059.007 (JavaScript)
  • TA0003 PersistenceT1098, T1098.002 (Account Manipulation, Additional Email Delegate Permissions)
  • TA0005 Defense EvasionT1027 (Obfuscated Files or Information), T1036 (Masquerading), T1564 (Hide Artifacts), T1656 (Impersonation)
  • TA0006 Credential AccessT1056 (Input Capture), T1078 (Valid Accounts)
  • TA0009 CollectionT1114 (Email Collection)
  • TA0010 ExfiltrationT1041 (Exfiltration Over C2 Channel)
  • TA0011 Command and ControlT1071, T1071.001 (Web Protocols)

References

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox