Risk actors are significantly abusing Internet Details Services (IIS) extensions to backdoor servers as a means of establishing a “long lasting persistence mechanism.”
Microsoft 365 Defender Research Team released a warning on the backdoors that are harder to detect due to residing in the same directories as legitimate modules used by target applications.
Malicious IIS Extensions
Malicious IIS extensions are less frequently encountered in attacks against servers, with attackers often only using script web shells as the first stage payload.
IIS backdoors are also harder to detect since they mostly reside in the same directories as legitimate modules used by target applications. It gets deployed later provides stealthy and persistent access to the hacked server.
Then, malicious IIS modules allow threat actors to harvest credentials from the system’s memory, collect data from the network and infected devices, and deliver other malware payloads.
These IIS modules are not common for the format of backdoor malware. Especially when compared to typical web application threats like web shells. This means that threats can be easily missed during the standard file monitoring efforts, so it is important to mitigate risks.
“The backdoor experienced designed-in ability to execute Trade management functions, these kinds of as enumerating put in mailbox accounts and exporting mailboxes for exfiltration,” security researcher Hardik Suri stated.
Mitigation Steps
- use the most current security updates for server components.
- keep antivirus and other protections enabled.
- evaluate sensitive roles and groups, and limit accessibility by practicing the basic principle of minimum-privilege and preserving fantastic credential cleanliness.
Indicators of compromise (IOCs)
File name | SHA-256 |
HttpCompress.dll | 4446f5fce13dd376ebcad8a78f057c0662880fdff7fe2b51706cb5a2253aa569 |
HttpSessionModule.dll | 1d5681ff4e2bc0134981e1c62ce70506eb0b6619c27ae384552fe3bdc904205c |
RewriterHttpModule.dll | c5c39dd5c3c3253fffdd8fee796be3a9361f4bfa1e0341f021fba3dafcab9739 |
Microsoft.Exchange.HttpProxy. HttpUtilities.dll | d820059577dde23e99d11056265e0abf626db9937fc56afde9b75223bf309eb0 |
HttpManageMoudle.dll | 95721eedcf165cd74607f8a339d395b1234ff930408a46c37fa7822ddddceb80 |
IIS_backdoor.dll | e352ebd81a0d50da9b7148cf14897d66fd894e88eda53e897baa77b3cc21bd8a |
FinanceSvcModel.dll | 5da41d312f1b4068afabb87e40ad6de211fa59513deb4b94148c0abde5ee3bd5 |
App_Web_system_web.ashx.dll | 290f8c0ce754078e27be3ed2ee6eff95c4e10b71690e25bbcf452481a4e09b9d |
App_Web_error.ashx.dll | 2996064437621bfecd159a3f71166e8c6468225e1c0189238068118deeabaa3d |
Follow Us on: Twitter, Instagram, Facebook to get the latest security news!
Leave A Comment