Skip to main content

Statistics Report on Malware Targeting Windows Web Servers in Q2 2025

Medium
Published: Fri Aug 08 2025 (08/08/2025, 17:08:28 UTC)
Source: AlienVault OTX General

Description

AhnLab Security Intelligence Center analyzed attacks on Windows web servers during Q2 2025 using their Smart Defense infrastructure. The study focused on poorly managed servers, categorizing attack types and malware strains. It revealed that multiple threat actors often target vulnerable servers simultaneously, exploiting unpatched systems or misconfigurations. Attackers typically use file upload vulnerabilities to deploy web shells and execute commands, but may also exploit framework or Web Application Server weaknesses. The analysis provides detailed statistics on the number of affected systems and the frequency of attacks, offering insights into the current threat landscape for Windows-based web servers.

AI-Powered Analysis

AILast updated: 08/08/2025, 21:18:05 UTC

Technical Analysis

The reported threat concerns a campaign targeting Windows-based web servers during Q2 2025, as analyzed by the AhnLab Security Intelligence Center using their Smart Defense infrastructure. The analysis highlights that attackers focus primarily on poorly managed and unpatched Windows web servers, exploiting vulnerabilities such as file upload flaws to deploy web shells. These web shells enable remote command execution, allowing attackers to control compromised servers. Besides file upload vulnerabilities, attackers also exploit weaknesses in web application frameworks and web application servers, including Microsoft IIS and Apache Tomcat, to gain unauthorized access. Multiple threat actors often simultaneously target the same vulnerable servers, indicating a highly contested attack surface. The campaign involves various malware strains, including the Wograt web shell, and employs multiple tactics aligned with MITRE ATT&CK techniques such as T1190 (Exploit Public-Facing Application), T1505.003 (Server Software Component), and T1071 (Application Layer Protocol). Indicators of compromise include numerous file hashes and a suspicious domain (linuxwork.net). Although no specific CVEs or known exploits in the wild are cited, the campaign's medium severity rating reflects the ongoing risk posed by unpatched or misconfigured Windows web servers exposed to the internet. The report provides valuable statistical insights into attack frequency and affected systems, underscoring the persistent threat landscape for Windows web servers in 2025.

Potential Impact

For European organizations, this threat poses significant risks due to the widespread use of Windows-based web servers in enterprise environments, government agencies, and critical infrastructure sectors. Successful exploitation can lead to unauthorized remote code execution, enabling attackers to deploy web shells that facilitate persistent access, data exfiltration, lateral movement, and potential disruption of web services. Compromised web servers may serve as pivot points for broader network intrusions, impacting confidentiality, integrity, and availability of sensitive data and services. Given the campaign targets poorly managed and unpatched servers, organizations with inadequate patch management or weak security configurations are particularly vulnerable. The presence of multiple threat actors targeting the same servers simultaneously increases the likelihood of rapid compromise and complicates incident response efforts. Additionally, exploitation of web application frameworks and servers like IIS and Apache Tomcat, which are widely deployed across Europe, amplifies the potential attack surface. This threat could disrupt business operations, damage reputations, and lead to regulatory consequences under GDPR if personal data is compromised.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy tailored to this threat landscape. First, conduct comprehensive asset inventories to identify all Windows-based web servers and associated web application frameworks (e.g., IIS, Apache Tomcat). Prioritize patch management to ensure all systems are updated with the latest security patches, especially those addressing known file upload vulnerabilities and web server flaws. Harden web servers by disabling unnecessary modules and services, enforcing strict file upload controls, and implementing input validation to prevent malicious payloads. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block web shell uploads and suspicious command execution patterns. Monitor logs and network traffic for indicators of compromise, including the provided file hashes and suspicious domains like linuxwork.net. Employ endpoint detection and response (EDR) solutions to detect anomalous behaviors linked to remote code execution and lateral movement. Regularly conduct penetration testing and vulnerability assessments focusing on web server configurations and application security. Establish incident response plans that include rapid containment and remediation procedures for web shell infections. Finally, provide security awareness training to IT staff on emerging web server threats and secure configuration best practices.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://asec.ahnlab.com/en/88925"]
Adversary
null
Pulse Id
68962f0cc24e24c3ada6d33b
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash06ebef1f7cc6fb21f8266f8c9f9ae2d9
hash3f6211234c0889142414f7b579d43c38
hash460953e5f7d1e490207d37f95c4f430a
hash4c8ccdc6f1838489ed2ebeb4978220cb
hash5c835258fc39104f198bca243e730d57
hash6014b987ce6a1cae02eabf799ef387822c781fd2
hash818c736a8491de2ea6361ba938268425193b07b7
hasha646c67e87109c9fd71a0bafbaa9b954148e144b
hash37bf9a1d95df82ca50d7467c7c456dc7ed7970bb55710a2bcb084d6db957186f
hash7be293f546c1a6f503bec6c57aa256a01c4bf91504f6f1205e3a0df7b7e90ac4
hash975433abc7777a82287620aa9858a367a8300086290a6b89635e8694778821ec

Domain

ValueDescriptionCopy
domainlinuxwork.net

Threat ID: 689665faad5a09ad0006b467

Added to database: 8/8/2025, 9:02:50 PM

Last enriched: 8/8/2025, 9:18:05 PM

Last updated: 8/10/2025, 6:44:48 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats