Security News > 2021 > December > Malicious Exchange Server Module Hoovers Up Outlook Credentials

Researchers have uncovered a previously unknown malicious IIS module, dubbed Owowa, that steals credentials when users log into Microsoft Outlook Web Access.
"The particular danger with Owowa is that an attacker can use the module to passively steal credentials from users who are legitimately accessing web services," he explained.
The malicious module can be loaded by a cyberattacker that has initial access to the server environment, researchers explained.
"The module is first registered in the global assembly cache, and can then be loaded by the IIS server that is running the OWA application," according to Kaspersky.
If the OWA username is Fb8v91c6tHiKsWzrulCeqO, the malicious module deletes the content of the encrypted credentials log, and returns the OK string;.
Malicious IIS modules, and Owowa in particular, can be identified by using the command "Appcmd.exe" or the IIS configuration tool, which lists all the loaded modules on a given IIS server.
News URL
https://threatpost.com/malicious-exchange-server-module-outlook-credentials/177077/
Related news
- Microsoft Exchange Online outage affects Outlook web users (source)
- Windows 10 KB5051974 update force installs new Microsoft Outlook app (source)
- Microsoft fixes bug causing Windows Server 2025 boot errors (source)
- Microsoft's End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now (source)
- Microsoft fixes Outlook drag-and-drop broken by Windows updates (source)
- Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators (source)
- Microsoft says button to restore classic Outlook is broken (source)
- Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto Wallets (source)
- Microsoft: Exchange Online bug mistakenly quarantines user emails (source)
- Hijacked Microsoft web domain injects spam into SharePoint servers (source)