Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    NotesleuNotesleu
    Home»Cybersecurity»Lazarus Hackers Exploit Microsoft IIS Servers for Malware Dissemination

    Lazarus Hackers Exploit Microsoft IIS Servers for Malware Dissemination

    By NotesleuNo Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Reddit Copy Link

    The Lazarus hacking group, reportedly backed by North Korea, is reportedly exploiting Windows Internet Information Service (IIS) servers, infiltrating them for malware dissemination.

    IIS is a web server solution developed by Microsoft, which is predominantly used to host websites or application services such as Microsoft’s Outlook on the Web, part of their Exchange platform.

    ASEC, South Korean security analysts, had previously indicated that Lazarus was targeting IIS servers to gain initial access to corporate networks. However, the latest reports reveal that the threat group is now also utilizing inadequately secured IIS services for malware distribution.

    This strategy provides a straightforward route to infect the visitors of websites or users of services hosted on the compromised IIS servers that are owned by reputable organizations.

    Recent Attacks on South Korean Infrastructure

    In a series of recent attacks monitored by ASEC, Lazarus was found to exploit legitimate South Korean websites to conduct ‘Watering Hole’ attacks on visitors employing an unsecured version of the INISAFE CrossWeb EX V6 software.

    This software is used extensively by both public and private organizations across South Korea for a range of applications, including electronic financial transactions, security certification, and internet banking.

    The vulnerability in INISAFE was previously reported by Symantec and ASEC in 2022. These reports detailed its exploitation through HTML email attachments.

    Typical attack vectors include malicious HTM files, often received as a deceptive link in an email or downloaded from the web. These files are then copied to a DLL file called scskapplink.dll and subsequently injected into the legitimate system management software INISAFE Web EX Client, according to the Symantec report from 2022.

    The vulnerability allows for the retrieval of a malicious ‘SCSKAppLink.dll’ payload from an already compromised IIS web server, which has been manipulated into acting as a malware distribution server.

    Further Details on the Exploitation Method

    ASEC’s latest report explains that the threat actor initially gains control over IIS web servers before using them as a platform for distributing malware. The specific payload was not analyzed by ASEC, but it is believed to be a malware downloader consistent with other recent Lazarus campaigns.

    Further, Lazarus employs the ‘JuicyPotato’ privilege escalation malware (‘usopriv.exe’) to secure higher-level access to the compromised system. The JuicyPotato malware executes a second malware loader (‘usoshared.dat’) which decrypts downloaded data files and executes them into memory, thereby evading antivirus software.

    ASEC advises that users of NISAFE CrossWeb EX V6 should update their software to the latest version to safeguard against Lazarus’ exploitation, which has been ongoing since at least April 2022. The company suggests an upgrade to version 3.3.2.41 or later and directs users to remediation instructions issued four months ago, which also highlight the growing Lazarus threat.

    This incident emphasizes the increasing attractiveness of Microsoft application servers as targets for hackers, due to the servers’ trusted reputation. A recent report by CERT-UA and Microsoft showed that Russian Turla hackers had also been using compromised Microsoft Exchange servers to deliver backdoors to their targets.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 56
    Featured Trending
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleAtera Windows Installers’ Zero-Day Vulnerabilities Pose Risk of Privilege Escalation Attacks
    Next Article Unpatched Citrix Servers Remain Vulnerable to CVE-2023-3519 RCE Attacks: Over 15,000 at Risk

    Related Posts

    General News December 26, 2025

    Indian National Pleads Guilty to $37 Million Cryptocurrency Theft Scheme

    December 26, 2025
    Cyber Attacks December 26, 2025

    2 Million Affected by SQL Injection and XSS Data Breach

    December 26, 2025
    Cyber Attacks December 26, 2025

    Cybersecurity Experts Uncover ToddyCat’s Expanded Arsenal of Data Theft Tools

    December 26, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Popular Post

    Complete HTML Handwritten Notes

    NKAbuse Malware Exploits NKN Blockchain for Advanced DDoS Attacks

    Advanced Python Mastery: For the Serious Developer

    Complete C++ Handwritten Notes From Basic to Advanced

    Google Introduces New Features Empowering Users to Manage Online Information

    © 2025 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.