New APT Hacking Group Targets Microsoft IIS Servers with ASP.NET Exploits

A new really able and persistent danger actor has been focusing on important high-profile community and non-public entities in the U.S. as portion of a collection of targeted cyber intrusion assaults by exploiting net-facing Microsoft Online Information and facts Companies (IIS) servers to infiltrate their networks.

Israeli cybersecurity agency Sygnia, which discovered the marketing campaign, is tracking the state-of-the-art, stealthy adversary beneath the moniker “Praying Mantis” or “TG2021.”

Stack Overflow Teams

“TG1021 makes use of a custom made-produced malware framework, designed all around a prevalent core, tailor-manufactured for IIS servers. The toolset is fully volatile, reflectively loaded into an influenced machine’s memory and leaves small-to-no trace on infected targets,” the scientists claimed. “The danger actor also utilizes an added stealthy backdoor and quite a few write-up-exploitations modules to perform network reconnaissance, elevate privileges, and go laterally within networks.”

APT Hacking Group

Aside from exhibiting capabilities that show a substantial energy to stay clear of detection by actively interfering with logging mechanisms and properly evading professional endpoint detection and response (EDR) units, the menace actor has been known to leverage an arsenal of ASP.Internet website software exploits to acquire an initial foothold and backdoor the servers by executing a advanced implant named “NodeIISWeb” that is created to load tailor made DLLs as effectively as intercept and deal with HTTP requests received by the server.

APT Hacking Group

The vulnerabilities are taken gain of by the actor consist of:

Prevent Data Breaches

Interestingly, Sygnia’s investigation into TG1021’s practices, methods, and treatments (TTPs) have unearthed “major overlaps” to those people of a country-sponsored actor named “Copy-Paste Compromises,” as detailed in an advisory launched by the Australian Cyber Stability Centre (ACSC) in June 2020, which explained a cyber campaign focusing on general public-struggling with infrastructure mostly by way of the use of unpatched flaws in Telerik UI and IIS servers. On the other hand, a formal attribution is still to be made.

“Praying Mantis, which has been observed focusing on large-profile public and non-public entities in two big Western markets, exemplifies a increasing trend of cyber criminals employing innovative, nation-state assault methods to target business companies,” the scientists explained. “Steady forensics functions and well timed incident response are vital to figuring out and properly defending networks from attacks by equivalent risk actors.”

Fibo Quantum