In a controversial move, police forces executed court-authorized operations to remotely patch vulnerable Zimbra servers belonging to private companies without their consent. Dubbed "Operation PowerOff" (an extension of the anti-DDoS botnet strategy), authorities scanned for the critical (an authentication bypass leading to RCE).
Stay patched. Check your logs. And for the love of protocol, close port 7071. zimbra police
In 2025, the question is no longer if the Zimbra Police will knock on your server’s port, but who will get there first—the good cops trying to save you, or the bad cops looking to cash in. Check your logs
When they found a vulnerable server, the "good cops" didn't arrest anyone. Instead, they injected a script that forcibly patched the vulnerability and sent a message to the admin email: "Your server was vulnerable. We fixed it for you. Update your software." When they found a vulnerable server, the "good
Enter the —a sardonic industry nickname for the swarm of automated threat hunters, bounty seekers, and forensic investigators who treat unpatched Zimbra instances like parked cars with unlocked doors. Operation PowerOff and the "Good Cop" Raids The most literal interpretation of "Zimbra Police" occurred in late 2023 and early 2024. International law enforcement agencies, including the French Gendarmerie (C3N) and Dutch Police (NHTCU) , began conducting "preventative hacks."