Kaspersky security lab has recently identified a digital threat that installs malicious webserver IIS modules that work with Microsoft Exchange Outlook Web Access.
These malicious IIS modules are capable of stealing credentials and data from devices as well as executing commands remotely.
This threat is dubbed “Owowa,” the first sample of this threat was detected at the end of 2020 when it was sent to VirusTotal security services.
Since then Owowa has undergone several extensive updates, with the latest version dating from April 2021. Owowa is a .NET v4.0 assembly that is developed with C#, the attacker loads it as a module within an IIS web server that uncovers the OWA (Exchange’s Outlook Web Access).
According to the Kaspersky report, In the OWA login page credentials that are entered by any user can be stolen, and not only that even it also allows its operators to run arbitrary code and commands remotely on the compromised server.
It is used primarily in attacks against the government servers, public transport, and other crucial services in countries like:-
Owowa has been programmed by the hackers to log all the credentials that result in authorized access to infected Microsoft Exchange servers.
However, after that the hackers start grabbing the following things:-
Here, after stealing the above things the hackers start encrypting them through RSA, and then the malicious agent controllers execute commands for their submissions.
Here we have mentioned below all the OWA login error messages that are present by the operators on the login page:-
The unusual type of attack on Microsoft Exchange servers is the main highlight of Owowa. From malicious web shells, all these codes are made and this also allows these codes to run on the platform.
Apart from this, in hosting configurations all these malicious IIS modules are used, and security solutions or AVs skip these malicious IIS modules, which makes them more stealthy and sophisticated.
Moreover, Kaspersky is still scrutinizing for ways to dissuade all these attacks, but here, the possible way to remove the infection is the removal of the malicious modules.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.
The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the path…
Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake proof-of-concept…
A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has been…
Fraudsters in the Middle East are exploiting a vulnerability in the government services portal. By…
Juniper Networks has disclosed a significant vulnerability affecting its Junos OS and Junos OS Evolved…
CrowdStrike, a leader in cybersecurity, uncovered a sophisticated phishing campaign that leverages its recruitment branding…