On Microsoft Exchange Servers, a New IceApple Exploit Toolkit was Launched

This article has been indexed from

CySecurity News – Latest Information Security and Hacking Incidents

 

Security analysts discovered a new post-exploitation framework that could enable Microsoft Exchange servers to be compromised. This framework, known as IceApple, was created by threat actors who wanted to preserve a low profile while launching long-term attacks to assist reconnaissance and data exfiltration. 
“As of May 2022, IceApple is under active development, with 18 modules seen in operation across several enterprise contexts,” CrowdStrike reported. The complex virus was identified in various victim networks and in geographically separate areas, which were detected in late 2021. Victims come from a variety of fields, including technology, academia, and government.
IceApple is unique for being an in-memory framework, implying a threat actor’s desire to keep a low forensic footprint and avoid detection, which bears all the signs of a long-term algorithmic mission by creating files that appear to come from Microsoft’s IIS web server. While most of the malware has been found on Microsoft Exchange servers, IceApple can function under any Internet Information Services (IIS) web app, making it a dangerous threat.
IceApple activity, as per CrowdStrike researchers, could be linked to nation-state attacks. Although IceApple has not been linked to any single threat actor, many believe it was developed by China. 

Read the original article:

On Microsoft Exchange Servers, a New IceApple Exploit Toolkit was Launched

Liked it? Take a second to support IT Security News on Patreon!
Become a patron at Patreon!