Microsoft IIS Web server is the new attack vehicle for Several Malware families

The Cybersecurity and Infrastructure Security Agency (CISA) shared that Kaseya's VSA software was used to push a malicious PowerSheII script The VSA software

#ESETresearch reveals #IIStealer, a malicious IIS web server extension targeting credit card information from e-commerce transactions. IIStealer is implemented as a native module for Internet Information Services, Microsoft’s web server software.

It handles the server’s BeginRequest post-event notification, which means its code is called every time the IIS server starts processing a new HTTP request.

IIStealer intercepts all the server traffic and logs payment information from e-commerce transactions, targeting POST requests made to payment URIs. The attacker then exfiltrates the logs by sending a special request to the compromised IIS server with an embedded password.

The malware affects e-commerce websites that don’t use third-party payment gateways.

Even with SSL/TLS and encrypted communication channels, IIStealer can access all data handled by the server, including credit card information being processed in its unencrypted state.

Eset has published all the IOCs at the following location: click here

Read Eset’s full guide into analyzing malicious native IIS modules at: click here

Metmox's Recommendations and best practices

The best way to harden an IIS server is to:

Metmox’s Cybersecurity Practitioners, Professional Services (PS), and Security Specialists are available to help determine the next steps beyond the guidance/guidelines. We provide you with proactive, contextual and effective Hardening and Standardization w.r.t IIS Webserver STIG click here, OWASP guide to hardening IIS. click here, Center for Internet Security IIS 10 Benchmark. Benchmarks and click here for pdf.

As a part of our Managed Security Services, we collect Web site activity data in the W3C log file format from Microsoft IIS servers, along with these logs, we also ingest W3C-compliant log files generated by standard logging as well as advanced logging in IIS. This will be relevant to comply with technical, regulatory, and compliance reports such as PCI DSS, HIPAA, OWASP Top 10, and many others.

Metmox is also capable of performing a full-fledged security assessment of a website or web application and discovers server misconfigurations and vulnerabilities