Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    Wednesday, February 11
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
    NotesleuNotesleu
    Home»Cybersecurity»Lazarus Hackers Exploit Microsoft IIS Servers for Malware Dissemination
    Cybersecurity

    Lazarus Hackers Exploit Microsoft IIS Servers for Malware Dissemination

    By securnerd3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Follow Us
    Google News

    The Lazarus hacking group, reportedly backed by North Korea, is reportedly exploiting Windows Internet Information Service (IIS) servers, infiltrating them for malware dissemination.

    IIS is a web server solution developed by Microsoft, which is predominantly used to host websites or application services such as Microsoft’s Outlook on the Web, part of their Exchange platform.

    ASEC, South Korean security analysts, had previously indicated that Lazarus was targeting IIS servers to gain initial access to corporate networks. However, the latest reports reveal that the threat group is now also utilizing inadequately secured IIS services for malware distribution.

    This strategy provides a straightforward route to infect the visitors of websites or users of services hosted on the compromised IIS servers that are owned by reputable organizations.

    Recent Attacks on South Korean Infrastructure

    In a series of recent attacks monitored by ASEC, Lazarus was found to exploit legitimate South Korean websites to conduct ‘Watering Hole’ attacks on visitors employing an unsecured version of the INISAFE CrossWeb EX V6 software.

    This software is used extensively by both public and private organizations across South Korea for a range of applications, including electronic financial transactions, security certification, and internet banking.

    The vulnerability in INISAFE was previously reported by Symantec and ASEC in 2022. These reports detailed its exploitation through HTML email attachments.

    Typical attack vectors include malicious HTM files, often received as a deceptive link in an email or downloaded from the web. These files are then copied to a DLL file called scskapplink.dll and subsequently injected into the legitimate system management software INISAFE Web EX Client, according to the Symantec report from 2022.

    The vulnerability allows for the retrieval of a malicious ‘SCSKAppLink.dll’ payload from an already compromised IIS web server, which has been manipulated into acting as a malware distribution server.

    Further Details on the Exploitation Method

    ASEC’s latest report explains that the threat actor initially gains control over IIS web servers before using them as a platform for distributing malware. The specific payload was not analyzed by ASEC, but it is believed to be a malware downloader consistent with other recent Lazarus campaigns.

    Further, Lazarus employs the ‘JuicyPotato’ privilege escalation malware (‘usopriv.exe’) to secure higher-level access to the compromised system. The JuicyPotato malware executes a second malware loader (‘usoshared.dat’) which decrypts downloaded data files and executes them into memory, thereby evading antivirus software.

    ASEC advises that users of NISAFE CrossWeb EX V6 should update their software to the latest version to safeguard against Lazarus’ exploitation, which has been ongoing since at least April 2022. The company suggests an upgrade to version 3.3.2.41 or later and directs users to remediation instructions issued four months ago, which also highlight the growing Lazarus threat.

    This incident emphasizes the increasing attractiveness of Microsoft application servers as targets for hackers, due to the servers’ trusted reputation. A recent report by CERT-UA and Microsoft showed that Russian Turla hackers had also been using compromised Microsoft Exchange servers to deliver backdoors to their targets.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 63

    Related Posts

    • Gadgets That Will Upgrade Your Home
    • What is Suno AI? A complete guide to how to use the free AI music generation service and how much it costs
    • New Nitrogen malware pushed via Google Ads for ransomware attacks
    • Complete Python Ebook From Basic To Advanced
    Follow on Google News
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Add A Comment
    Leave A Reply Cancel Reply

    Recent Post

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024

    Top 7 Open-Source LLMs for 2024 and Their Uses

    July 18, 2024
    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Latest

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024
    Popular Post

    Microsoft Enhances Windows 11 Security with Kerberos Authentication Over NTLM Protocol

    October 15, 202318 Views

    New Nitrogen malware pushed via Google Ads for ransomware attacks

    July 27, 2023222 Views

    Hacking Group Cult of the Dead Cow Develops Veilid, an End-to-End Encryption System for Social Media and Messaging Apps

    August 3, 202356 Views
    • Contact Us
    • About US
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2026 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.