Security News > 2021 > December > Malicious Exchange Server Module Hoovers Up Outlook Credentials

Researchers have uncovered a previously unknown malicious IIS module, dubbed Owowa, that steals credentials when users log into Microsoft Outlook Web Access.
"The particular danger with Owowa is that an attacker can use the module to passively steal credentials from users who are legitimately accessing web services," he explained.
The malicious module can be loaded by a cyberattacker that has initial access to the server environment, researchers explained.
"The module is first registered in the global assembly cache, and can then be loaded by the IIS server that is running the OWA application," according to Kaspersky.
If the OWA username is Fb8v91c6tHiKsWzrulCeqO, the malicious module deletes the content of the encrypted credentials log, and returns the OK string;.
Malicious IIS modules, and Owowa in particular, can be identified by using the command "Appcmd.exe" or the IIS configuration tool, which lists all the loaded modules on a given IIS server.
News URL
https://threatpost.com/malicious-exchange-server-module-outlook-credentials/177077/
Related news
- Microsoft fixes button that restores classic Outlook client (source)
- Microsoft fixes auth issues on Windows Server, Windows 11 24H2 (source)
- Microsoft investigates global Exchange Admin Center outage (source)
- Microsoft: Windows Server 2025 restarts break connectivity on some DCs (source)
- Microsoft warns of CPU spikes when typing in classic Outlook (source)
- Microsoft: Exchange 2016 and 2019 reach end of support in six months (source)
- Microsoft fixes Windows Server 2025 blue screen, install issues (source)
- Microsoft announces fix for CPU spikes when typing in Outlook (source)
- Oh, cool. Microsoft melts bug that froze Server 2025 Remote Desktop sessions (source)
- Microsoft pitches pay-to-patch reboot reduction subscription for Windows Server 2025 (source)