logo_SVG-01
✕
  • Platform
    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    • Managed Security Services
    • Managed Penetration Testing
  • Services
    • Assess
      • Compromise Assessment
      • Advanced Persistent Threats Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      • SOC Maturity Assessment
      • SOC Model Evaluation
      • SOC Gap Analysis
      • SIEM Gap Analysis
      • SIEM Optimization
      • SOC Content Pack
    • Train
      • Simulated Cyber Attack Exercise
      • Tabletop Exercise
      • Security Awareness and Training
    • Respond
      • Incident Analysis
      • Incident Response
  • Solutions
  • Resources
    • Blogs
    • Press Releases
    • Threat Insights
      • Threat Intelligence Reports
      • Threat Advisories
      • Monthly Threat Insights
  • Why Rewterz?
    • About Us
    • Careers
    • Contact
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Rewterz Threat Alert – Lazarus Threat Actor Group Abuses Microsoft IIS Servers for Widespread Malware Distribution

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    September 13, 2023
    Rewterz
    September 13, 2023
    Rewterz Threat Advisory – Multiple Microsoft .NET Vulnerabilities
    Severity High Analysis Summary CVE-2023-36788 CVSS:7.8 Microsoft .NET Framework could allow a remote attacker to execute arbitrary code on the system. By persuading a victim to […]
    September 13, 2023
    Rewterz
    September 13, 2023
    Rewterz Threat Advisory – CVE-2023-38163 – Microsoft Defender Vulnerability
    Severity High Analysis Summary CVE-2023-38163 Microsoft Defender could allow a local authenticated attacker to bypass security restrictions, cause by a flaw in the Attack Surface Reduction […]
    September 13, 2023
    Rewterz
    September 13, 2023
    Rewterz Threat Advisory – Multiple Zoom Products Vulnerabilities
    Severity Medium Analysis Summary CVE-2023-39201 CVSS:7.2 Zoom CleanZoom could allow a local authenticated attacker to gain elevated privileges on the system, caused by untrusted search path. […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Rewterz Threat Alert – Lazarus Threat Actor Group Abuses Microsoft IIS Servers for Widespread Malware Distribution

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    September 13, 2023
    Rewterz
    September 13, 2023
    Rewterz Threat Advisory – Multiple Microsoft .NET Vulnerabilities
    Severity High Analysis Summary CVE-2023-36788 CVSS:7.8 Microsoft .NET Framework could allow a remote attacker to execute arbitrary code on the system. By persuading a victim to […]
    September 13, 2023
    Rewterz
    September 13, 2023
    Rewterz Threat Advisory – CVE-2023-38163 – Microsoft Defender Vulnerability
    Severity High Analysis Summary CVE-2023-38163 Microsoft Defender could allow a local authenticated attacker to bypass security restrictions, cause by a flaw in the Attack Surface Reduction […]
    September 13, 2023
    Rewterz
    September 13, 2023
    Rewterz Threat Advisory – Multiple Zoom Products Vulnerabilities
    Severity Medium Analysis Summary CVE-2023-39201 CVSS:7.2 Zoom CleanZoom could allow a local authenticated attacker to gain elevated privileges on the system, caused by untrusted search path. […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
Rewterz
Rewterz Threat Advisory – Multiple Oracle Java SE Vulnerabilities
July 25, 2023
Rewterz
Rewterz Threat Update – AMD Zen2 Processors Vulnerable to Zenbleed Attack, Exposing Sensitive Data Leakage
July 25, 2023

Rewterz Threat Alert – Lazarus Threat Actor Group Abuses Microsoft IIS Servers for Widespread Malware Distribution

July 25, 2023

Severity

High

Analysis Summary

The Lazarus hacking group, a state-sponsored cybercrime collective from North Korea, has been engaging in a sophisticated campaign to breach Windows Internet Information Service (IIS) web servers for the distribution of malware. IIS, a widely used web server solution developed by Microsoft, serves as a crucial infrastructure for hosting websites and application services, including Microsoft Exchange’s Outlook on the Web.

The cybersecurity landscape has witnessed an increase in targeted attacks on IIS web servers, likely due to their trusted nature and prevalence in enterprise environments. Lazarus, known for its advanced hacking capabilities, is leveraging poorly protected IIS services to breach corporate networks and distribute malicious payloads, targeting unsuspecting visitors to websites and users of services hosted on compromised servers. The main advantage of this technique lies in the ease of infecting users who place trust in websites owned by reputable organizations.

In recent incidents documented by South Korean security analysts, Lazarus compromised legitimate South Korean websites, using a technique known as “Watering Hole” attacks, to exploit vulnerabilities in the INISAFE CrossWeb EX V6 software. This particular software is widely used in South Korea for electronic financial transactions, security certification, internet banking, and more. Lazarus exploited a known vulnerability in INISAFE to initiate its attacks.

Lazarus initiates its attack by using malicious HTML email attachments or malicious links in emails to deliver a compromised HTM file. This HTM file is then copied to a DLL file named ‘scskapplink.dll’ and injected into the legitimate system management software INISAFE Web EX Client. The exploitation of the INISAFE flaw provides the hackers with a foothold in the compromised system.

Once Lazarus gains control over the IIS web servers, they use these compromised servers to distribute malware. The analysis indicates that Lazarus used the compromised IIS servers to host the ‘SCSKAppLink.dll’ payload, which is subsequently downloaded onto the victim’s system during the attack. By employing this approach, the attackers can distribute malware to a broader audience without being directly traced back to their own servers.

To further escalate their access and ensure persistence, Lazarus utilizes the ‘JuicyPotato’ privilege escalation malware (‘usopriv.exe’) to attain higher-level privileges within the compromised system. This privilege escalation is essential for executing a second malware loader (‘usoshared.dat’). The second loader decrypts the downloaded data files and executes them into memory, allowing the malware to operate without being easily detected by traditional antivirus software.

Researchers advise users of INISAFE CrossWeb EX V6 to update the software to its latest version to mitigate the risk of Lazarus exploiting known vulnerabilities. The use of trusted Microsoft application servers, such as IIS and Exchange, by threat actors for malware distribution is becoming a common trend, making it essential for organizations to ensure proper security measures are in place.

Impact

  • Privilege Escalation
  • System Compromise

Remediation

  • Patch Management and Software Updates: Regularly update and patch all software components, including IIS, OS, and third-party apps.
  • Secure Configuration of IIS Servers: Apply industry best practices, disable unnecessary services, and use secure HTTP response headers.
  • Web Application Firewall (WAF): Deploy a robust WAF to protect against web-based attacks.
  • Regular Security Audits and Penetration Testing: Conduct periodic audits and penetration tests to identify vulnerabilities.
  • Intrusion Detection and Prevention Systems (IDPS): Implement IDPS to monitor and detect anomalous network activity.
  • User Education and Awareness: Educate users about cyber threats and caution when clicking links or downloading files.
  • Multi-Factor Authentication (MFA): Enforce MFA for critical accounts and privileged users.
  • Network Segmentation: Segment the network to limit lateral movement for attackers.
  • Incident Response and Recovery Plan: Develop a comprehensive incident response plan and conduct regular exercises.

Platform

  • Rewterz XDR
  • Rewterz Defense
  • Rewterz Threat Intelligence

Managed Security Services

  • Managed Security Monitoring
  • Remote SOC
  • Onsite SOC
  • Hybrid SOC

Assess

  • Compromise Assessment
  • APT Assessment
  • Penetration Testing
  • Architecture Design & Review
  • Red Team Assessment
  • Purple Team Assessment
  • Social Engineering
  • Source Code Review

Transform

  • SOC Consultancy
  • SOC Maturity Assessment
  • SOC Model Evaluation
  • SOC Gap Analysis
  • SIEM Gap Analysis
  • SIEM Optimization
  • SOC Content Pack

Train

  • Simulated Cyber Attack Exercise
  • Tabletop Exercise
  • Security Awareness and Training

Respond

  • Incident Analysis
  • Incident Response

Threat Insights

  • Threat Advisories
  • Monthly Threat Insights
  • Threat Intelligence Reports

Resources

  • Blog
  • Press Releases

Connect With Us

  • Contact
  • Careers
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.
Get a Demo