• Home
  • News
  • Artificial Intelligence
  • Internet of Things
  • Open Source
  • Hardware
  • Software
  • Security
  • Resources
  • Industry Voice
  • Data Strategy Spotlight
  • Newsletters
  • Resources
    • Inqlogo 120x194
      Five things you should look for in choosing a Testing provider

      Choosing a Testing Partner can be complex.  So what do you look for?  This guide offers insight into the qualities you must look for in choosing a Testing provider.  Download now to learn more.

      Download
      Inqlogo 120x194
      Your questions answered: How to protect your data in the cloud

      The number of successful cyberattacks per year per company has increased by 46% over the last four years. But what really needs to be considered when exploring a solution? What questions need to be asked? Download to find out...

      Download
      Find resources
      Search by title or subject area
      View all resources
  • Follow us
    • RSS
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • Google+
    • YouTube
  • Newsletter
  • Industry Voice
  • Data Strategy Spotlight
The Inquirer
The Inquirer
  • Home
  • News
  • Artificial Intelligence
  • Internet of Things
  • Open Source
  • Hardware
  • Software
  • Security
  • Trending
  • ICO fines Facebook
  • Thomas Cook breach
  • Galaxy Note 9
  • iPhone 9
  • World Cup
The Inquirer
  • Security

Windows servers running IIS 6.0 targeted by crypto-mining hackers

Attackers are using unpatched servers to mine Electroneum

Windows servers running IIS 6.0 targeted by crypto-mining hackers
Windows servers running IIS 6.0 targeted by crypto-mining hackers
  • Nicholas Fearn
  • Nicholas Fearn
  • 16 April 2018
  • Tweet  
  • Facebook  
  • Google plus  
  •  
  •  
  • Send to  
0 Comments

HACKERS ARE EXPLOITING previously discovered - and patched - IIS 6.0 vulnerability to take control of Windows servers and mine Electroneum cryptocurrency.

First identified by two researchers in China in March 2017, the CVE-2017-7269 vulnerability allows hackers to install a malware strain on the IIS 6.0 service.

When they made the discovery, the exploit had been in circulation for around nine months. Crooks began tapping into the vulnerability in June 2016.

The researchers alerted Microsoft about the flaw, but the firm was initially hesitant to release a patch because IIS 6.0 had already been discontinued.

However, after the Shadow Brokers hacking group - believed to be a front for Russian intelligence - found similarities between the IIS 6.0 vulnerability and 'ExplodingCan' NSA exploit, Microsoft finally published a fix.

"Microsoft Internet Information Services (IIS) 6.0 is vulnerable to a zero-day Buffer Overflow vulnerability (CVE-2017-7269) due to an improper validation of an 'IF' header in a PROPFIND request," said security firm Trend Micro at the time.

"A remote attacker could exploit this vulnerability in the IIS WebDAV Component with a crafted request using PROPFIND  method.

"Successful exploitation could result in denial of service condition or arbitrary code execution in the context of the user running the application." 

Initially, hackers used the flaw to turn Windows servers running on IIS 6.0 into Monero miners. But now, F5 Labs believes that crooks are also using it to mine Electroneum.

They are targeting vulnerable servers with an ASCII shellcode that consists of a Return-Oriented Programming (ROP) vulnerability.

By tapping into the shellcode, the hackers are able to install mining software onto infected hardware.

Although this exploit is clearly lucrative for hackers,  researchers explained that the server they investigated only contained $99 of the digital currency.

"F5 researchers recently noticed a new campaign exploiting a vulnerability in Microsoft Internet Information Services (IIS) 6.0 servers (CVE-2017-7269) in order to mine Electroneum crypto-currency," said the researchers.

"The ROP exploitation technique composes shellcode from instructions already loaded into memory, called "gadgets",

"Instead of writing and executing additional external code into memory. This allows attackers to bypass security mechanisms such as executable space protection, and code signing." µ

  • Tweet  
  • Facebook  
  • Google plus  
  •  
  •  
  • Send to  
  • Topics
  • Security
  • Microsoft
  • Security
  • Hacking
  • cryptojacking
  • Windows
  • cryptocurrency

INQ Latest

India sets the bar for net neutrality with 'world's strictest' rules
India sets the bar for net neutrality with 'world's strictest' rules

Seems like a good place to buy a server innit

  • Infrastructure
  • 12 July 2018
Intel's Xeon E 2018 chips take aim at entry-level workstations
Intel's new Xeon E chips take aim at entry-level workstations

Ryzen-rivaling silicon packs up to six cores and twelve threads

  • Chips
  • 12 July 2018
 Chrome 67 Site Isolation keeps Spectre attacks at bay
Chrome 67 protects against Spectre hacks but gobbles more RAM

Render processes get split to avoid Spectre bug exploits

  • Security
  • 12 July 2018
ZTE's long-running saga with the US government is almost over
ZTE's long-running saga with the US government is almost over

Firm strikes a deal to end seven-year supply ban

  • Friction
  • 12 July 2018
Back to Top

Most read

Galaxy Note 9 release date, specs and price: 24 August release date tipped as Samsung looks to offset 'sluggish' S9 sales
Galaxy Note 9 release date, specs and price: 24 August release date tipped
iPhone 9: Apple's LCD iPhone will 'adopt new backlight chips' to reduce bezel size
iPhone 9: Apple's LCD iPhone will 'adopt new backlight chips' to reduce bezel size
OnePlus 6 price, specs and news: OnePlus 6 'Red' edition goes on sale
OnePlus 6 price, specs and news: OnePlus 6 'Red' edition goes on sale
Apple to kill off the iPhone X and iPhone SE due to 'pent-up demand' for 2018 models
Apple to kill off the iPhone X and iPhone SE due to 'pent-up demand' for 2018 models
Loose lips at Huawei may have brought Android P out of its shell
Loose lips at Huawei may have brought Android P out of its shell
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • Google+
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017