Tuesday, July 16, 2024
EHA

IIS Web Servers Based Attacks Increased by 1.7 Million in Last Quarter of 2018

In the second quarter of 2018 IIS, Drupal, and Oracle WebLogic are highly targeted by attackers. IIS based attacks alone increased from two thousand to 1.7 million, since Q1
2018.

According to eSentire, the attacks based on following web technologies increased in Q2 2018. IIS (30 percent), WebLogic (24 percent) and Apache (less than one percent).

“Biotechnology, Accounting, Real Estate, Marketing, and Construction were the top verticals that experienced the highest amount of traffic due to outdated vulnerabilities.”

IIS Based Attacks

IIS Based Attacks

Most of the IIS attacks are combined Oracle Fusion Middleware vulnerability CVE-2017-10271 and the code execution vulnerability with (CVE-2017-7269) IIS version 6.0.

The attackers don’t target a particular industry reads the eSentire report. With Biotechnology the IIS 6.0 and WebLogic exploit were dominant, Real Estate, marketing firm targeted with D-Link exploit and Finally, Construction experienced Drupalgeddon2 attacks.

IIS Based Attacks
eSentire also had a collection of operating systems among the attacking infrastructure involved – over 400 of the attacking IPs had Shodan records indicating they were Windows machines (including XP, 7, 8, 2008, and 2012). Additionally, nearly 350 FTP servers and more than 100 mail servers were reported.

According to Shodan report, more than 3.5 million IIS web servers exposed. In the second quarter of 2018, many hacking groups attack IPs with a unique set of exploits and some IPs with multiple exploits.

Other Events

The four-year-old banking trojan Emotet emerges again and the attackers distribute the malware through pdf and doc files.

The Emotet is one of the rapidly spreading banking trojans that could cost around $1 Million to recovered the affected networks and the malware authors are continuously improving the malware to maintain the persistence.

IIS Based Attacks

Forty-nine percent of Emotet samples included “invoice,” “payment” or “account”
in their filename. The filenames of unspecified documents often consisted only of random strings of numbers and letters. Emotet and Hancitor were observed in large portions with the second quarter.

Hancitor also called as Chanitor is typically sent as a macro-enabled empowered Office document in phishing messages with “critical” messages, for example, phone messages, faxes or invoices.

Observations of malicious PowerShell in Q2 2018 showed a slight decrease in unique PowerShell commands (48 in Q1 vs. 44 in Q2) and a corresponding two percent decrease in obfuscation techniques.

Related Read

How To Respond Cyber Incident In your Organization

Most Important Steps to Prevent Your Organization From Identity Theft -Detailed Explanation

Website

Latest articles

Critical Cellopoint Secure Email Gateway Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability has been discovered in the Cellopoint Secure Email Gateway, identified as...

Singapore Banks to Phase out OTPs for Bank Account Logins Within 3 Months

The Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS)...

GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data

A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to...

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in...

Malicious NuGet Campaign Tricking Developers To Inject Malicious Code

Hackers often target NuGet as it's a popular package manager for .NET, which developers...

Akira Ransomware Attacking Airline Industry With Legitimate Tools

Airlines often become the target of hackers as they contain sensitive personal and financial...

DarkGate Malware Exploiting Excel Files And SMB File Shares

DarkGate, a Malware-as-a-Service (MaaS) platform, experienced a surge in activity since September 2023, employing...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles