Microsoft IIS Web Server: The New Target for Malware Attacks
Discover the latest research by #ESETresearch exposing the IIStealer, a malicious extension for Microsoft's Internet Information Services (IIS) web server.
Find flaws in web, mobile, and IoT applications.
Expose risks in AWS, Azure, and GCP environments.
Ongoing testing to catch real-world vulnerabilities as they appear.
Live-fire exercises to sharpen detection and response.
Time-boxed security assessments across networks, apps, and infrastructure.
Simulated attacks to test detection and incident response.
Named security experts integrated seamlessly into your team.
Real-time detection and automated threat response.
24x7 monitoring and response by expert analysts.
Nonstop scanning to prioritize and reduce risk.
Ongoing scanning, triage, and compliance tracking.
Unified security platform powering all UV services.
Cross-platform toolkit for advanced red team ops.
Secure your code, infrastructure, and deployment pipelines before attackers exploit them.
September 19, 2025
August 27, 2025
June 26, 2025
UltraViolet Cyber is a practitioner-led MSSP delivering offensive and defensive security to Global 2000 and Federal clients. Built by former intelligence operators, we unify application security, red teaming, detection, and engineering under one roof. Our UV Lens platform replaces silos with integrated, outcome-driven operations.
UltraViolet Cyber
OakBot, originally billed as a modular banking trojan, has been utilized as an information stealer since 2008 and has been upgraded over the years to become a ransomware delivery agent. A major break in successfully combating OakBot came when the FBI and CISA released a joint advisory alert (and subsequent cybersecurity advisory) on August 30, 2023, that released indicators of compromise of the QakBot infrastructure. However, OakBot persists, and on May 14, 2024, Microsoft released a patch within its security updates. Bleeping Computer reported: “Tracked as CVE-2024-30051, this privilege escalation bug is caused by a heap-based buffer overflow in the DWM (Desktop Window Manager) core library. Following successful exploitation, attackers can gain SYSTEM privileges.”i Connecting the dots, Bleeping Computer showed that the Microsoft security update for CVE-2024-30051 also combats OakBot.
The joint FBI and CISA advisory defined OakBot as follows: “Originally used as a banking trojan to steal banking credentials for account compromise, QakBot—in most cases—was delivered via phishing campaigns containing malicious attachments or links to download the malware, which would reside in memory once on the victim network. QakBot has since grown to deploy multiple types of malware, trojans, and highly destructive ransomware variants targeting the United States and other global infrastructures, including the Election Infrastructure Subsector, Financial Services, Emergency Services, and Commercial Facilities Sectors.”ii A review of the MITRE ATT&CK framework shows over 50 tactics and techniques used by OakBot to complete its malicious mission.iii
The fight continues against OakBot, and the investigation trail reads like a spy novel, involving cyber criminals, US Government agencies, and top researchers. The FBI and CISA have done a fantastic job with getting the information out on OakBot; however, as indicated by Microsoft’s May Security Updates including a patch for CVE-2024-30051, it is apparent that the affected systems (listed in the CVE) have had a readily available exploit friendly to OakBot through the DWM core library. The FBI’s website includes a very exciting read, which includes their take: “FBI, Partners Dismantle Qakbot Infrastructure in Multinational Cyber Takedown.”iv This could be a seminal event in cybersecurity as the “Operation marks one of the largest-ever U.S.-led enforcement actions against a botnet.”v
Every cybersecurity department should immediately review the CISA and FBI’s Joint Advisory on QakBot Infrastructure as it contains in-depth matter that relates to the malicious infrastructure. UltraViolet recommends that all affected systems be patched against CVE-2024-30051 with Microsoft’s May security updates.
CISA and FBI Publish Joint Advisory on QakBot Infrastructure | CISA. (2023, August 30). Cybersecurity and Infrastructure Security Agency (CISA).
Critical Patches Issued for Microsoft Products, May 14, 2024. (n.d.). CIS.
FBI, Partners Dismantle Qakbot Infrastructure in Multinational Cyber Takedown. (2023, August 29).
Federal Bureau of Investigation. https://www.fbi.gov/news/stories/fbi-partners-dismantle-qakbot-infrastructure-in-multinational-cyber-takedown
Gatlan, S. (2024a, May 14). Microsoft fixes Windows Server bug causing crashes, NTLM auth failures.
Bleeping Computer. https://www.bleepingcomputer.com
Gatlan, S. (2024b, May 14). Microsoft fixes Windows zero-day exploited in QakBot malware attacks.
Bleeping Computer. https://www.bleepingcomputer.com
Identification and Disruption of QakBot Infrastructure | CISA. (2023, August 30). Cybersecurity and Infrastructure Security Agency CISA.
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-242a
Security Update Guide - Microsoft Security Response Center. (n.d.-a).
https://msrc.microsoft.com/update-guide/releaseNote/2024-May
Security Update Guide - Microsoft Security Response Center. (n.d.-b).
https://msrc.microsoft.com/update-guide/
i https://www.bleepingcomputer.com
iii https://attack.mitre.org/software/S0650/
We’re here to help. Get in touch for an initial conversation with one of our security experts and learn more about how UltraViolet Cyber can help you take cyber readiness and resilience to new levels.