Thursday, April 18, 2024

Hackers Using Weaponized IIS Module to Stealing Credentials & Enabling RCE

Kaspersky security lab has recently identified a digital threat that installs malicious webserver IIS modules that work with Microsoft Exchange Outlook Web Access. 

These malicious IIS modules are capable of stealing credentials and data from devices as well as executing commands remotely.

Owowa

This threat is dubbed “Owowa,” the first sample of this threat was detected at the end of 2020 when it was sent to VirusTotal security services.

Since then Owowa has undergone several extensive updates, with the latest version dating from April 2021. Owowa is a .NET v4.0 assembly that is developed with C#, the attacker loads it as a module within an IIS web server that uncovers the OWA (Exchange’s Outlook Web Access).

According to the Kaspersky report, In the OWA login page credentials that are entered by any user can be stolen, and not only that even it also allows its operators to run arbitrary code and commands remotely on the compromised server.

It is used primarily in attacks against the government servers, public transport, and other crucial services in countries like:-

  • Malaysia
  • Mongolia
  • Indonesia 
  • Philippines

Abilities of Owowa 

Owowa has been programmed by the hackers to log all the credentials that result in authorized access to infected Microsoft Exchange servers. 

However, after that the hackers start grabbing the following things:-

  • IP address
  • Username
  • Password
  • Login time

Here, after stealing the above things the hackers start encrypting them through RSA, and then the malicious agent controllers execute commands for their submissions.

OWA login error messages

Here we have mentioned below all the OWA login error messages that are present by the operators on the login page:-

  • if the OWA username is jFuLIXpzRdateYHoVwMlfc, Owowa will return the encrypted credentials log, encoded in base64;
  • if the OWA username is Fb8v91c6tHiKsWzrulCeqO, the malicious module deletes the content of the encrypted credentials log, and returns the OK string (encrypted using RSA);
  • If the OWA username is dEUM3jZXaDiob8BrqSy2PQO1, Owowa executes the command that is typed in the OWA password field using PowerShell on the compromised server. The result of the command is encrypted (as previously described) and returned to the operator.

The unusual type of attack on Microsoft Exchange servers is the main highlight of Owowa. From malicious web shells, all these codes are made and this also allows these codes to run on the platform.

Apart from this, in hosting configurations all these malicious IIS modules are used, and security solutions or AVs skip these malicious IIS modules, which makes them more stealthy and sophisticated.

Moreover, Kaspersky is still scrutinizing for ways to dissuade all these attacks, but here, the possible way to remove the infection is the removal of the malicious modules.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

Xiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400)

In the wake of the recent disclosure of a critical vulnerability (CVE-2024-3400) affecting a...

Cerber Linux Ransomware Exploits Atlassian Servers to Take Full Control

Security researchers at Cado Security Labs have uncovered a new variant of the Cerber...

FGVulDet – New Vulnerability Detector to Analyze Source Code

Detecting source code vulnerabilities aims to protect software systems from attacks by identifying inherent...

North Korean Hackers Abuse DMARC To Legitimize Their Emails

DMARC is targeted by hackers as this serves to act as a preventative measure...

L00KUPRU Ransomware Attackers discovered in the wild

A new variant of the Xorist ransomware, dubbed L00KUPRU, has been discovered in the...

Oracle Releases Biggest Security Update in 2024 – 372 Vulnerabilities Are Fixed – Update Now!

Oracle has released its April 2024 Critical Patch Update (CPU), addressing 372 security vulnerabilities...

Outlook Login Panel Themed Phishing Attack Evaded All Antivirus Detections

Cybersecurity researchers have uncovered a new phishing attack that has bypassed all antivirus detections.The...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles