Actively exploited server backdoor remains undetected in most organisations' networks
Kaspersky researchers identified a growing trend of implanting highly stealthy backdoors in the servers belonging to the most powerful organisations
Security researchers at Kaspersky have discovered a new server backdoor targeting governments and NGOs across most geographic regions.
Dubbed SessionManager, the backdoor is found in Internet Information Services (IIS), a popular web server software designed and maintained by Microsoft for use with its NT servers.
Optimising storage infrastructure for DevOps practices
Maintaining IT infrastructure to best support application servicesFree Download
Researchers said the discovery of SessionManager, found in early 2022, signals a growing trend involving cyber criminals targeting IIS with malicious modules to gain access to sensitive information.
The investigation began after the team started observing threat actors dropping other backdoors in IIS a few months earlier in December 2021, such as ‘Owowa’, after exploiting vulnerabilities in Microsoft Exchange Server akin to the ProxyLogon exploit.
The original malicious module found in IIS, Owowa, was designed to steal credentials from Outlook Web Access (OWA) when users attempted to sign in.
SessionManager is the latest finding and once installed on a victim’s server, the cyber criminal is able to gain access to sensitive information, such as an organisation’s emails, the researchers said, or manage servers while evading detection to potentially use as malicious infrastructure.
It also has the power to read, write, and delete arbitrary files on a compromised server, enable remote code execution, and establish endpoint connections between arbitrary networks and the compromised server.
When SessionManager’s capabilities are combined, these can “make it a lightweight persistent initial access backdoor,” said Pierre Delcher, senior security researcher at Kaspersky’s Global Research and Analysis team.
One of the hallmark features of the implant is that it is highly stealthy, too, with many samples going undetected by popular online file-scanning services. SessionManager is still present in more than 90% of targeted orgainsations, according to Kaspersky’s internet scans, but has been operational since at least March 2021.
SessionManager infections have been scattered across the globe with observed success in every geographic region except North America and Oceania, according to Kaspersky's data.
Many Asian countries have been found to be targeted with other high-profile nations including the UK, Russia, and Saudi Arabia all believed to have been targeted too.
Kaspersky said the threat actors’ efforts have been concentrated on governments and NGOs, but medical, oil, and transportation companies have also been hit with SessionManager. Kaspersky said 34 servers were impacted in total, across 24 different organisations.
“The exploitation of Exchange Server vulnerabilities has been a favourite of cybercriminals looking to get into targeted infrastructure since Q1 2021,” said Delcher. “It notably enabled a series of long unnoticed cyberespionage campaigns.
“The recently discovered SessionManager was poorly detected for a year and is still deployed in the wild. Facing massive and unprecedented server-side vulnerability exploitation, most cybersecurity actors were busy investigating and responding to the first identified offences. As a result, it is still possible to discover related malicious activities months or years later, and this will probably be the case for a long time.”
Who is behind SessionManager?
Kaspersky has found difficulty in placing confident attribution for SessionManager on any given known advanced persistent threat (APT) group, though it has said the Gelsemium group “might” be the operator.
A combination of similar, but distinctively different, malicious binaries to SessionManager - discovered before SessionManager itself - and used in conjunction with other backdoors downloaded from the same staging server as SessionManager, led researchers to the Gelsemium group.
The researchers note that Gelsemium might be the sole operator, or one of more potential threat actors conducting attacks.
Gelsemium was first observed in 2014 and has, so far, been difficult to track and analyse given the small number of confirmed victims relative to the time it has been active.
Known targets of Gelsemium have included governments, universities, and religious organisations in East Asia and the Middle East, and it was also believed to be behind the supply chain hack on BigNox.
The Total Economic Impact™ Of Turbonomic Application Resource Management for IBM Cloud® Paks
Business benefits and cost savings enabled by IBM Turbonomic Application Resource ManagementFree Download
The Total Economic Impact™ of IBM Watson Assistant
Cost savings and business benefits enabled by Watson AssistantFree Download
The field guide to application modernisation
Moving forward with your enterprise application portfolioFree Download
AI for customer service
Discover the industry-leading AI platform that customers and employees want to useFree Download