
A scorching potato: If one wanted extra indication that the safety of Microsoft Exchange servers nonetheless seems to be like Swiss cheese, a risk actor referred to as Gelsemium has supplied one. Security researchers at Kaspersky consider the group has been utilizing stealthy malware dubbed SessionManager to assault the server infrastructure of public organizations worldwide for greater than a 12 months.
On Thursday, Kaspersky researchers revealed a worrying report regarding a brand new, hard-to-detect backdoor that targets Exchange servers utilized by authorities and medical establishments, navy organizations, and NGOs in a number of nations. The malware, dubbed SessionManager, was first noticed in early 2022.
At the time, a few of the malware samples noticed by analysts weren’t getting flagged by many standard on-line file scanning providers. Furthermore, the SessionManager an infection persists in over 90 p.c of the focused organizations.
The risk actors behind SessionManager have been utilizing it for the previous 15 months. Kaspersky suspects a hacking group known as Gelsemium is answerable for the assaults as a result of the hacking patterns match the group’s MO. However, analysts can’t verify Gelsemium is the offender.
The malware makes use of potent malicious native-code modules written for Microsoft’s Internet Information Services (IIS) net server software program. Once put in, they may reply to particular HTTP requests to gather delicate info. Attackers can even take full management over the servers, deploy further hacking instruments, and use them for different malicious functions.
Interestingly, the method of putting in SessionManager is determined by exploiting a set of vulnerabilities collectively known as ProxyLogon (CVE-2021-26855). Last 12 months, Microsoft mentioned that nicely over 90 p.c of Exchange servers had been patched or mitigated, however that also left many already-compromised servers in danger.
The disinfection course of is kind of difficult, however Kaspersky researchers have supplied a number of tips on defending your group towards threats like SessionManager. You can even seek the advice of Securelist for extra related info on how SessionManager operates and indicators of compromise.