BSD-pour-Tous



Rejoignez le forum, c’est rapide et facile

BSD-pour-Tous

BSD-pour-Tous

Vous souhaitez réagir à ce message ? Créez un compte en quelques clics ou connectez-vous pour continuer.

Zimbra Police -

In 2025, the question is no longer if the Zimbra Police will knock on your server’s port, but who will get there first—the good cops trying to save you, or the bad cops looking to cash in.

Over the last 18 months, a perfect storm has formed around this open-source email and collaboration platform. Used by over 200,000 businesses, government entities, and educational institutions worldwide (particularly in Brazil, France, and Italy), Zimbra has become the primary target for a new wave of automated "police"—ranging from ransomware gangs to national cyber squads conducting takedown operations. Why Zimbra? The answer lies in the math of patch management. Zimbra holds approximately 8-10% of the global email server market, but it lacks the "guilty until proven patched" reputation of Microsoft. This relative obscurity led to a false sense of security. zimbra police

The "Zimbra Police" in this context refers to the extortionists who, after deploying ransomware, leave a .txt file in the /opt/zimbra/jetty/webapps/zimbra/public/ directory titled POLICE_NOTICE.txt , ironically mimicking law enforcement language: "Your security negligence has been noted. A fine of 20 BTC is due immediately." The third pillar of the "Zimbra Police" is the forensic analyst. As Zimbra becomes a common entry point for breaches, incident response (IR) teams have developed specific triage playbooks. In 2025, the question is no longer if

That illusion shattered starting in 2021 with (an unauthenticated SQL injection) and exploded with CVE-2022-27924 (Memcached command injection). However, the watershed moment was CVE-2023-38750 —a remote code execution vulnerability that allowed unauthenticated attackers to drop webshells with the privileges of the zimbra user. Why Zimbra

In June 2023, a major Italian research institute was hit. In August 2023, a French municipal government lost access to 20 years of emails. The attack vector? (a cross-site scripting vulnerability chained with a deserialization flaw).

Security researchers noticed a pattern: exploit code was being weaponized within hours of a patch being released, not weeks. This signaled the arrival of automated "scanners" patrolling the IPv4 address space, specifically looking for Zimbra's default ports (25, 443, 7071, 9071).

When they found a vulnerable server, the "good cops" didn't arrest anyone. Instead, they injected a script that forcibly patched the vulnerability and sent a message to the admin email: "Your server was vulnerable. We fixed it for you. Update your software."