Monday, March 17, 2025
HomeCyber Security NewsLazarus Group Weaponizes IIS Servers for Deploying Malicious ASP Web Shells

Lazarus Group Weaponizes IIS Servers for Deploying Malicious ASP Web Shells

Published on

SIEM as a Service

Follow Us on Google News

The notorious Lazarus group has been identified as leveraging compromised IIS servers to deploy malicious ASP web shells.

These sophisticated attacks have been reported to facilitate the spread of malware, including the LazarLoader variant, and utilize privilege escalation tools to gain extensive control over infected systems.

The Lazarus group, associated with North Korean actors, has been active in orchestrating high-profile cyber operations, ranging from financial heists to espionage missions.

Their tactics often involve exploiting vulnerabilities in web servers and leveraging web shells to manage their command and control (C2) infrastructure.

Recent Attack Techniques

Recent reports from AhnLab Security Intelligence Center (ASEC) highlight the Lazarus group’s latest tactics involving IIS servers.

These servers, specifically targeting South Korean entities, are used as first-stage C2 servers, acting as proxies to mediate communication between malware and secondary C2 servers.

This strategic setup allows the group to maintain stealth and longevity in their operations.

C2 Script Analysis

The newly identified C2 script, while differing from past variants, maintains a similar purpose—operating as a proxy to manage communication across different stages of the attack.

The same type as the C2 script publicly disclosed by Kaspersky
The same type as the C2 script publicly disclosed by Kaspersky

Notable enhancements include support for both form data and cookie data during communication. The script handles various commands:

  • Form Mode:
    • MidRequest: Redirect data
    • ProxyCheck: Save mid info
    • ReadFile, WriteFile: Manipulate files
    • ClientHello: Respond with mid info and write proxy log
    • ProxyLog: Respond with proxy log
    • CheckFileTransfer: Look up file
  • Cookie Method:
    • Similar commands are supported, with MidRequest, ReadFile, WriteFile, and ClientHello

Web Shell Analysis

In addition to C2 scripts, the Lazarus group has utilized web shells like the RedHat Hacker web shell.

RedHat Hacker web shell
RedHat Hacker web shell

The web shells, found in files such as function2.asp, are encrypted and require a password for access, which was recently identified as 2345rdx.

These shells provide extensive functionalities, including file management, process execution, and SQL queries.

Other web shells named file_uploader_ok.asp and find_pwd.asp were also identified, offering similar capabilities while using different encryption keys for packet decryption.

LazarLoader and Privilege Escalation

LazarLoader, a malware loader, has been observed in conjunction with these web shells. It downloads, decrypts, and executes payloads from external sources.

Installation log of LazarLoader
Installation log of LazarLoader

In recent attacks, LazarLoader was used to load additional malware, leveraging a hardcoded address for payload download and a specific key for decryption.

Alongside LazarLoader, a privilege escalation tool was identified, employing UAC bypass techniques through ComputerDefaults.exe or fodhelper.exe to execute malware with elevated privileges.

Impact and Recommendations

The Lazarus group’s ability to weaponize IIS servers and exploit vulnerabilities underscores the importance of robust security measures for web servers. Here are key recommendations:

  • Regular Security Audits: Conduct frequent audits to detect any unauthorized access or changes in server configurations.
  • Strong Authentication: Ensure strong passwords are used for all web related access points, and consider multi-factor authentication.
  • Up-to-Date Software: Keep operating systems, web servers, and security software updated to prevent exploitation of known vulnerabilities.
  • Monitor Network Traffic: Implement monitoring tools to detect suspicious communication patterns indicative of C2 activity.

In conclusion, the Lazarus group’s evolving tactics highlight the need for vigilance and proactive defense strategies against such sophisticated threats.

As cyber adversaries continue to innovate, staying informed about the latest attack techniques is crucial for effective cybersecurity.

For organizations concerned about these threats, the following actions are recommended:

  1. Review Server Configurations to ensure they are not exposed to unnecessary vulnerabilities.
  2. Implement Enhanced Monitoring tools to catch anomalies in real-time.
  3. Train Personnel on recognizing and responding to potential security incidents.

By taking these proactive steps, organizations can significantly reduce their exposure to the ongoing threats posed by the Lazarus group and similar cyber actors.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

In recent months, a sophisticated social engineering technique known as ClickFix has gained significant...

Supply Chain Attack Targets 23,000 GitHub Repositories

A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which...

Beware! Malware Hidden in Free Word-to-PDF Converters

The FBI has issued a warning about a growing threat involving free file conversion...

MassJacker Clipper Malware Targets Users Installing Pirated Software

A recent investigation has uncovered previously unknown cryptojacking malware, dubbed MassJacker, which primarily targets...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

In recent months, a sophisticated social engineering technique known as ClickFix has gained significant...

Supply Chain Attack Targets 23,000 GitHub Repositories

A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which...

Beware! Malware Hidden in Free Word-to-PDF Converters

The FBI has issued a warning about a growing threat involving free file conversion...