Friday, April 11, 2025
HomeCyber AttackIIS Web Servers Based Attacks Increased by 1.7 Million in Last Quarter...

IIS Web Servers Based Attacks Increased by 1.7 Million in Last Quarter of 2018

Published on

SIEM as a Service

Follow Us on Google News

In the second quarter of 2018 IIS, Drupal, and Oracle WebLogic are highly targeted by attackers. IIS based attacks alone increased from two thousand to 1.7 million, since Q1
2018.

According to eSentire, the attacks based on following web technologies increased in Q2 2018. IIS (30 percent), WebLogic (24 percent) and Apache (less than one percent).

“Biotechnology, Accounting, Real Estate, Marketing, and Construction were the top verticals that experienced the highest amount of traffic due to outdated vulnerabilities.”

- Advertisement - Google News
IIS Based Attacks

IIS Based Attacks

Most of the IIS attacks are combined Oracle Fusion Middleware vulnerability CVE-2017-10271 and the code execution vulnerability with (CVE-2017-7269) IIS version 6.0.

The attackers don’t target a particular industry reads the eSentire report. With Biotechnology the IIS 6.0 and WebLogic exploit were dominant, Real Estate, marketing firm targeted with D-Link exploit and Finally, Construction experienced Drupalgeddon2 attacks.

IIS Based Attacks
eSentire also had a collection of operating systems among the attacking infrastructure involved – over 400 of the attacking IPs had Shodan records indicating they were Windows machines (including XP, 7, 8, 2008, and 2012). Additionally, nearly 350 FTP servers and more than 100 mail servers were reported.

According to Shodan report, more than 3.5 million IIS web servers exposed. In the second quarter of 2018, many hacking groups attack IPs with a unique set of exploits and some IPs with multiple exploits.

Other Events

The four-year-old banking trojan Emotet emerges again and the attackers distribute the malware through pdf and doc files.

The Emotet is one of the rapidly spreading banking trojans that could cost around $1 Million to recovered the affected networks and the malware authors are continuously improving the malware to maintain the persistence.

IIS Based Attacks

Forty-nine percent of Emotet samples included “invoice,” “payment” or “account”
in their filename. The filenames of unspecified documents often consisted only of random strings of numbers and letters. Emotet and Hancitor were observed in large portions with the second quarter.

Hancitor also called as Chanitor is typically sent as a macro-enabled empowered Office document in phishing messages with “critical” messages, for example, phone messages, faxes or invoices.

Observations of malicious PowerShell in Q2 2018 showed a slight decrease in unique PowerShell commands (48 in Q1 vs. 44 in Q2) and a corresponding two percent decrease in obfuscation techniques.

Related Read

How To Respond Cyber Incident In your Organization

Most Important Steps to Prevent Your Organization From Identity Theft -Detailed Explanation

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Researchers Exploit Windows Defender with XOR and System Calls

A recent cybersecurity revelation has demonstrated how researchers successfully bypassed Windows Defender antivirus mechanisms...

Ivanti 0-Day RCE Flaw Exploitation Details Revealed

A critical unauthenticated Remote Code Execution (RCE) vulnerability, CVE-2025-22457, has been disclosed by Ivanti, sparking concerns across...

Jenkins Docker Vulnerability Allows Hackers to Hijack Network Traffic

A newly disclosed vulnerability affecting Jenkins Docker images has raised serious concerns about network...

Microsoft Issues Urgent Patch to Fix Office Update Crash

Microsoft has released an urgent patch for Office 2016 to address a critical issue...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Researchers Exploit Windows Defender with XOR and System Calls

A recent cybersecurity revelation has demonstrated how researchers successfully bypassed Windows Defender antivirus mechanisms...

Ivanti 0-Day RCE Flaw Exploitation Details Revealed

A critical unauthenticated Remote Code Execution (RCE) vulnerability, CVE-2025-22457, has been disclosed by Ivanti, sparking concerns across...

Jenkins Docker Vulnerability Allows Hackers to Hijack Network Traffic

A newly disclosed vulnerability affecting Jenkins Docker images has raised serious concerns about network...