Regions Targeted: Ukraine, Bulgaria, Romania, Africa, EU, South America
Related Families: None specified
Key Takeaways
What is SpyPress?
The attack begins with spearphishing emails that exploit cross-site scripting (XSS) vulnerabilities, enabling Fancy Bear to inject SpyPress into victims’ webmail interfaces. In 2023, SpyPress was deployed against Roundcube webmail, exploiting CVE-2020-35730 to execute arbitrary JavaScript, granting access to email content, contacts, and credentials. By 2024, Fancy Bear expanded SpyPress’s deployment to Horde, MDaemon, and Zimbra platforms, exploiting platform-specific XSS flaws. A notable 2024 attack involved a zero-day XSS vulnerability in MDaemon (CVE-2024-11182), where SpyPress manipulated the HTML parser using a crafted `<img>` element and a `<noembed>` tag within a `<p>` element’s title attribute. ESET disclosed this flaw to MDaemon developers on November 1, 2024, prompting a patch in version 24.5.1. For Roundcube in 2024, SpyPress exploited CVE-2023-43770, patched in September 2023, which abused a regex flaw in the `rcube_string_replacer.php` script to create malicious hyperlinks.
SpyPress is designed for stealth, enabling persistent access to webmail environments and efficient data exfiltration. Its adaptability across multiple webmail platforms highlights Fancy Bear’s technical prowess.
Who is Fancy Bear?
Fancy Bear, also known as APT28, Sofacy, Pawn Storm, Sednit, STRONTIUM, Tsar Team, and Threat Group-4127, is a Russian nexus threat actor group active since at least 2004. Fancy Bear is attributed with high confidence to the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU), specifically the 85th Main Special Service Centre (Unit 26165).
Fancy Bear employs spearphishing emails with malicious attachments or links to spoofed websites for initial access, often leveraging social engineering to trick victims. The group deploys custom malware, such as XAgent, a remote access trojan for keylogging and file extraction, and Zebrocy, used in phishing campaigns. They exploit zero-day vulnerabilities, like CVE-2024-11182 in MDaemon webmail, to inject malicious JavaScript, as seen in Operation RoundPress. Fancy Bear uses look-alike domains to facilitate credential harvesting and maintains persistence through tools like CompuTrace, modified for malicious purposes. Their command-and-control infrastructure combines HTTP and DNS protocols to exfiltrate data stealthily.
Fancy Bear targets governmental entities, military organizations, defense contractors, and media outlets, with a focus on NATO-aligned and Transcaucasian states. Key targeted regions include the United States, Ukraine, Germany, France, Bulgaria, Romania, and the Middle East, alongside African, EU, and South American governments. Notable campaigns include the 2016 US Democratic National Committee breach and the 2015 German Bundestag attack. The group’s espionage and disruption efforts align with Russian strategic interests, often aiming to sow political discord or gather intelligence.
IOCs
PolySwarm has multiple samples associated with this activity.
335b1cd7708284fc1c2c6678f2f8d6737d68935ec992d680ff540f2e72774665
625e4c166c7a1d5a1becf56b27d4f76a2f95935cbd8d556c30a493263d10dbf8
You can use the following CLI command to search for all related samples in our portal:
$ polyswarm link list -f SpyPress
Don’t have a PolySwarm account? Go here to sign up for a free Community plan or subscribe.
Contact us at hivemind@polyswarm.io | Check out our blog | Subscribe to our reports.