Malicious IIS Extensions Gaining Popularity Among Cyber Criminals for Persistent Access

Home/Compromised, Internet Security, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update, Tips/Malicious IIS Extensions Gaining Popularity Among Cyber Criminals for Persistent Access

Malicious IIS Extensions Gaining Popularity Among Cyber Criminals for Persistent Access

Risk actors are significantly abusing Internet Details Services (IIS) extensions to backdoor servers as a means of establishing a “long lasting persistence mechanism.”

Microsoft 365 Defender Research Team released a warning on the backdoors that are harder to detect due to residing in the same directories as legitimate modules used by target applications.

Malicious IIS Extensions

Malicious IIS extensions are less frequently encountered in attacks against servers, with attackers often only using script web shells as the first stage payload.

IIS backdoors are also harder to detect since they mostly reside in the same directories as legitimate modules used by target applications. It gets deployed later provides stealthy and persistent access to the hacked server.

Then, malicious IIS modules allow threat actors to harvest credentials from the system’s memory, collect data from the network and infected devices, and deliver other malware payloads.

These IIS modules are not common for the format of backdoor malware. Especially when compared to typical web application threats like web shells. This means that threats can be easily missed during the standard file monitoring efforts, so it is important to mitigate risks.

“The backdoor experienced designed-in ability to execute Trade management functions, these kinds of as enumerating put in mailbox accounts and exporting mailboxes for exfiltration,” security researcher Hardik Suri stated.

Mitigation Steps

  • use the most current security updates for server components.
  • keep antivirus and other protections enabled.
  • evaluate sensitive roles and groups, and limit accessibility by practicing the basic principle of minimum-privilege and preserving fantastic credential cleanliness.

Indicators of compromise (IOCs)

File nameSHA-256
HttpCompress.dll 4446f5fce13dd376ebcad8a78f057c0662880fdff7fe2b51706cb5a2253aa569
HttpSessionModule.dll 1d5681ff4e2bc0134981e1c62ce70506eb0b6619c27ae384552fe3bdc904205c
RewriterHttpModule.dllc5c39dd5c3c3253fffdd8fee796be3a9361f4bfa1e0341f021fba3dafcab9739
Microsoft.Exchange.HttpProxy.
HttpUtilities.dll
d820059577dde23e99d11056265e0abf626db9937fc56afde9b75223bf309eb0
HttpManageMoudle.dll95721eedcf165cd74607f8a339d395b1234ff930408a46c37fa7822ddddceb80
IIS_backdoor.dlle352ebd81a0d50da9b7148cf14897d66fd894e88eda53e897baa77b3cc21bd8a
FinanceSvcModel.dll5da41d312f1b4068afabb87e40ad6de211fa59513deb4b94148c0abde5ee3bd5
App_Web_system_web.ashx.dll290f8c0ce754078e27be3ed2ee6eff95c4e10b71690e25bbcf452481a4e09b9d
App_Web_error.ashx.dll2996064437621bfecd159a3f71166e8c6468225e1c0189238068118deeabaa3d

Follow Us on: Twitter, InstagramFacebook to get the latest security news!

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!