Tuesday, May 13, 2025
HomeCyber AttackHackers Using Weaponized IIS Module to Stealing Credentials & Enabling RCE

Hackers Using Weaponized IIS Module to Stealing Credentials & Enabling RCE

Published on

SIEM as a Service

Follow Us on Google News

Kaspersky security lab has recently identified a digital threat that installs malicious webserver IIS modules that work with Microsoft Exchange Outlook Web Access. 

These malicious IIS modules are capable of stealing credentials and data from devices as well as executing commands remotely.

Owowa

This threat is dubbed “Owowa,” the first sample of this threat was detected at the end of 2020 when it was sent to VirusTotal security services.

- Advertisement - Google News

Since then Owowa has undergone several extensive updates, with the latest version dating from April 2021. Owowa is a .NET v4.0 assembly that is developed with C#, the attacker loads it as a module within an IIS web server that uncovers the OWA (Exchange’s Outlook Web Access).

According to the Kaspersky report, In the OWA login page credentials that are entered by any user can be stolen, and not only that even it also allows its operators to run arbitrary code and commands remotely on the compromised server.

It is used primarily in attacks against the government servers, public transport, and other crucial services in countries like:-

  • Malaysia
  • Mongolia
  • Indonesia 
  • Philippines

Abilities of Owowa 

Owowa has been programmed by the hackers to log all the credentials that result in authorized access to infected Microsoft Exchange servers. 

However, after that the hackers start grabbing the following things:-

  • IP address
  • Username
  • Password
  • Login time

Here, after stealing the above things the hackers start encrypting them through RSA, and then the malicious agent controllers execute commands for their submissions.

OWA login error messages

Here we have mentioned below all the OWA login error messages that are present by the operators on the login page:-

  • if the OWA username is jFuLIXpzRdateYHoVwMlfc, Owowa will return the encrypted credentials log, encoded in base64;
  • if the OWA username is Fb8v91c6tHiKsWzrulCeqO, the malicious module deletes the content of the encrypted credentials log, and returns the OK string (encrypted using RSA);
  • If the OWA username is dEUM3jZXaDiob8BrqSy2PQO1, Owowa executes the command that is typed in the OWA password field using PowerShell on the compromised server. The result of the command is encrypted (as previously described) and returned to the operator.

The unusual type of attack on Microsoft Exchange servers is the main highlight of Owowa. From malicious web shells, all these codes are made and this also allows these codes to run on the platform.

Apart from this, in hosting configurations all these malicious IIS modules are used, and security solutions or AVs skip these malicious IIS modules, which makes them more stealthy and sophisticated.

Moreover, Kaspersky is still scrutinizing for ways to dissuade all these attacks, but here, the possible way to remove the infection is the removal of the malicious modules.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Repeated Firmware Key-Management Failures Undermine Intel Boot Guard and UEFI Secure Boot

The security of fundamental technologies like Intel Boot Guard and UEFI Secure Boot has...

INE Security Alert: Top 5 Takeaways from RSAC 2025

Comprehensive Training Platform Delivers Solutions for AI Security, Cloud Management, and Incident Response Readiness. Fresh...

CISA Flags Hidden Functionality Flaw in TeleMessage TM SGNL on KEV List

Cybersecurity and Infrastructure Security Agency (CISA) has escalated its advisory for TeleMessage TM SGNL,...

Asus One-Click Flaw Exposes Users to Remote Code Execution Attacks

Critical security vulnerability in ASUS DriverHub software has been discovered that allowed attackers to...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Researchers Uncover Remote IT Job Fraud Scheme Involving North Korean Nationals

The United States indicted fourteen North Korean nationals for orchestrating a sophisticated scheme to...

Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques

Sophos Managed Detection and Response (MDR) in September 2024, the notorious Lumma Stealer malware...

New Noodlophile Malware Spreads Through Fake AI Video Generation Platforms

Cybercriminals have unleashed a new malware campaign using fake AI video generation platforms as...