Tuesday, March 4, 2025
HomeBackdoorAttackers Use Malicious IIS Extensions to Deploy Covert Backdoors into Exchange Servers

Attackers Use Malicious IIS Extensions to Deploy Covert Backdoors into Exchange Servers

Published on

SIEM as a Service

Follow Us on Google News

As opposed to web shells, malicious extensions for the IIS web server have a lower detection rate, which means attackers are increasingly using them to backdoor unpatched Exchange servers.

Since they can be hidden deep within a compromised server, and are often very difficult to detect. As they are installed in the same location as legitimate modules and use the same structure, attackers can provide themselves with the perfect and durable persistence mechanism that they need. 

Since they use the same structure as legitimate modules in order to achieve the same effect as legitimate modules. The actual mechanism used to create a backdoor is usually quite minimal and the logic is not regarded as malicious in most cases.

Continued Access and built-in Capability

It is rare that attackers will use unpatched security flaws in an app that is hosted to inject such malicious extensions into a server after successfully compromising it.

These types of attacks are usually deployed after the initial payload for the attack is deployed, usually a web shell. Later on, the IIS module is deployed on the compromised server so that it can be accessed more stealthily and persistently.

Previously, Microsoft experienced the installation of custom IIS backdoors after hackers exploited the following products:-

  • ZOHO ManageEngine ADSelfService Plus
  • SolarWinds Orion

There are several things that can be harvested by malicious IIS modules once they have been deployed, and here they are listed below:- 

  • From the memory of the system, credentials are retrieved
  • Data collection from infected devices and the victims’ network
  • Payloads are delivered at a higher rate

Types of IIS Backdoors

Here below we have mentioned all the types of IIS backdoors:-

  • Web shell-based variants
  • Open-source variants
  • IIS handlers
  • Credential stealers

As a result of Kaspersky’s recent analysis of IIS extensions delivered onto Microsoft Exchange servers, it has been observed that malware performs the following actions:-

  • Execute commands
  • Steal credentials remotely

It has been at least since March 2021 that a similar piece of IIS malware has been detected in the wild, and this malware is referred to as SessionManager. 

Recommendations

It is recommended that you consider the following mitigations in order to protect your system against attacks that use malicious IIS modules:- 

  • Make sure to keep Exchange servers up to date
  • It is important to keep anti-malware and security solutions enabled at all times
  • Make sure that roles and groups that are sensitive are reviewed
  • IIS virtual directories can be restricted in order to prevent unauthorized access
  • Alerts should be prioritized based on their importance
  • Ensure that the configuration files and bin folders are in order
Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hunters International Claims Tata Technologies Cyberattack

Multinational engineering and technology services firm Tata Technologies has reportedly fallen victim to a...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...

Google, Meta, and Apple Power the World’s Biggest Surveillance System

Imagine a government that tracks your daily movements, monitors your communications, and catalogs your...

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hunters International Claims Tata Technologies Cyberattack

Multinational engineering and technology services firm Tata Technologies has reportedly fallen victim to a...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...

Google, Meta, and Apple Power the World’s Biggest Surveillance System

Imagine a government that tracks your daily movements, monitors your communications, and catalogs your...