A Ukrainian maritime agency was compromised by Russian state-sponsored hackers APT28, who leveraged a vulnerability in Zimbra webmail software to gain unauthorized access. This targeted attack highlights the ongoing efforts of Russian threat actors to exploit weaknesses in software applications. The breach is particularly concerning given APT28's history of sophisticated and high-impact attacks. Technical details of the vulnerability, including its CVE designation, have not been publicly disclosed. The agency's use of Zimbra webmail software, widely used by government and private organizations, raises concerns about potential downstream effects on the broader supply chain1. As APT28 continues to evolve its tactics, security practitioners should be vigilant for similar attacks on other organizations using vulnerable software. This breach matters to cybersecurity professionals because it underscores the need for proactive vulnerability management and robust defenses against nation-state threats.