Security News > 2021 > December > Malicious Exchange Server Module Hoovers Up Outlook Credentials

Researchers have uncovered a previously unknown malicious IIS module, dubbed Owowa, that steals credentials when users log into Microsoft Outlook Web Access.
"The particular danger with Owowa is that an attacker can use the module to passively steal credentials from users who are legitimately accessing web services," he explained.
The malicious module can be loaded by a cyberattacker that has initial access to the server environment, researchers explained.
"The module is first registered in the global assembly cache, and can then be loaded by the IIS server that is running the OWA application," according to Kaspersky.
If the OWA username is Fb8v91c6tHiKsWzrulCeqO, the malicious module deletes the content of the encrypted credentials log, and returns the OK string;.
Malicious IIS modules, and Owowa in particular, can be identified by using the command "Appcmd.exe" or the IIS configuration tool, which lists all the loaded modules on a given IIS server.
News URL
https://threatpost.com/malicious-exchange-server-module-outlook-credentials/177077/
Related news
- Microsoft Exchange Online outage affects Outlook web users (source)
- Microsoft says button to restore classic Outlook is broken (source)
- Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto Wallets (source)
- Microsoft: Exchange Online bug mistakenly quarantines user emails (source)
- Hijacked Microsoft web domain injects spam into SharePoint servers (source)
- Microsoft fixes button that restores classic Outlook client (source)
- Microsoft fixes auth issues on Windows Server, Windows 11 24H2 (source)
- Microsoft investigates global Exchange Admin Center outage (source)
- Microsoft: Windows Server 2025 restarts break connectivity on some DCs (source)
- Microsoft warns of CPU spikes when typing in classic Outlook (source)