Statistics Report on Malware Targeting Windows Web Servers in Q2 2025
AhnLab Security Intelligence Center analyzed attacks on Windows web servers during Q2 2025 using their Smart Defense infrastructure. The study focused on poorly managed servers, categorizing attack types and malware strains. It revealed that multiple threat actors often target vulnerable servers simultaneously, exploiting unpatched systems or misconfigurations. Attackers typically use file upload vulnerabilities to deploy web shells and execute commands, but may also exploit framework or Web Application Server weaknesses. The analysis provides detailed statistics on the number of affected systems and the frequency of attacks, offering insights into the current threat landscape for Windows-based web servers.
AI Analysis
Technical Summary
The reported threat concerns a campaign targeting Windows-based web servers during Q2 2025, as analyzed by the AhnLab Security Intelligence Center using their Smart Defense infrastructure. The analysis highlights that attackers focus primarily on poorly managed and unpatched Windows web servers, exploiting vulnerabilities such as file upload flaws to deploy web shells. These web shells enable remote command execution, allowing attackers to control compromised servers. Besides file upload vulnerabilities, attackers also exploit weaknesses in web application frameworks and web application servers, including Microsoft IIS and Apache Tomcat, to gain unauthorized access. Multiple threat actors often simultaneously target the same vulnerable servers, indicating a highly contested attack surface. The campaign involves various malware strains, including the Wograt web shell, and employs multiple tactics aligned with MITRE ATT&CK techniques such as T1190 (Exploit Public-Facing Application), T1505.003 (Server Software Component), and T1071 (Application Layer Protocol). Indicators of compromise include numerous file hashes and a suspicious domain (linuxwork.net). Although no specific CVEs or known exploits in the wild are cited, the campaign's medium severity rating reflects the ongoing risk posed by unpatched or misconfigured Windows web servers exposed to the internet. The report provides valuable statistical insights into attack frequency and affected systems, underscoring the persistent threat landscape for Windows web servers in 2025.
Potential Impact
For European organizations, this threat poses significant risks due to the widespread use of Windows-based web servers in enterprise environments, government agencies, and critical infrastructure sectors. Successful exploitation can lead to unauthorized remote code execution, enabling attackers to deploy web shells that facilitate persistent access, data exfiltration, lateral movement, and potential disruption of web services. Compromised web servers may serve as pivot points for broader network intrusions, impacting confidentiality, integrity, and availability of sensitive data and services. Given the campaign targets poorly managed and unpatched servers, organizations with inadequate patch management or weak security configurations are particularly vulnerable. The presence of multiple threat actors targeting the same servers simultaneously increases the likelihood of rapid compromise and complicates incident response efforts. Additionally, exploitation of web application frameworks and servers like IIS and Apache Tomcat, which are widely deployed across Europe, amplifies the potential attack surface. This threat could disrupt business operations, damage reputations, and lead to regulatory consequences under GDPR if personal data is compromised.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to this threat landscape. First, conduct comprehensive asset inventories to identify all Windows-based web servers and associated web application frameworks (e.g., IIS, Apache Tomcat). Prioritize patch management to ensure all systems are updated with the latest security patches, especially those addressing known file upload vulnerabilities and web server flaws. Harden web servers by disabling unnecessary modules and services, enforcing strict file upload controls, and implementing input validation to prevent malicious payloads. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block web shell uploads and suspicious command execution patterns. Monitor logs and network traffic for indicators of compromise, including the provided file hashes and suspicious domains like linuxwork.net. Employ endpoint detection and response (EDR) solutions to detect anomalous behaviors linked to remote code execution and lateral movement. Regularly conduct penetration testing and vulnerability assessments focusing on web server configurations and application security. Establish incident response plans that include rapid containment and remediation procedures for web shell infections. Finally, provide security awareness training to IT staff on emerging web server threats and secure configuration best practices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Ireland
Indicators of Compromise
- hash: 06ebef1f7cc6fb21f8266f8c9f9ae2d9
- hash: 3f6211234c0889142414f7b579d43c38
- hash: 460953e5f7d1e490207d37f95c4f430a
- hash: 4c8ccdc6f1838489ed2ebeb4978220cb
- hash: 5c835258fc39104f198bca243e730d57
- hash: 6014b987ce6a1cae02eabf799ef387822c781fd2
- hash: 818c736a8491de2ea6361ba938268425193b07b7
- hash: a646c67e87109c9fd71a0bafbaa9b954148e144b
- hash: 37bf9a1d95df82ca50d7467c7c456dc7ed7970bb55710a2bcb084d6db957186f
- hash: 7be293f546c1a6f503bec6c57aa256a01c4bf91504f6f1205e3a0df7b7e90ac4
- hash: 975433abc7777a82287620aa9858a367a8300086290a6b89635e8694778821ec
- domain: linuxwork.net
Statistics Report on Malware Targeting Windows Web Servers in Q2 2025
Description
AhnLab Security Intelligence Center analyzed attacks on Windows web servers during Q2 2025 using their Smart Defense infrastructure. The study focused on poorly managed servers, categorizing attack types and malware strains. It revealed that multiple threat actors often target vulnerable servers simultaneously, exploiting unpatched systems or misconfigurations. Attackers typically use file upload vulnerabilities to deploy web shells and execute commands, but may also exploit framework or Web Application Server weaknesses. The analysis provides detailed statistics on the number of affected systems and the frequency of attacks, offering insights into the current threat landscape for Windows-based web servers.
AI-Powered Analysis
Technical Analysis
The reported threat concerns a campaign targeting Windows-based web servers during Q2 2025, as analyzed by the AhnLab Security Intelligence Center using their Smart Defense infrastructure. The analysis highlights that attackers focus primarily on poorly managed and unpatched Windows web servers, exploiting vulnerabilities such as file upload flaws to deploy web shells. These web shells enable remote command execution, allowing attackers to control compromised servers. Besides file upload vulnerabilities, attackers also exploit weaknesses in web application frameworks and web application servers, including Microsoft IIS and Apache Tomcat, to gain unauthorized access. Multiple threat actors often simultaneously target the same vulnerable servers, indicating a highly contested attack surface. The campaign involves various malware strains, including the Wograt web shell, and employs multiple tactics aligned with MITRE ATT&CK techniques such as T1190 (Exploit Public-Facing Application), T1505.003 (Server Software Component), and T1071 (Application Layer Protocol). Indicators of compromise include numerous file hashes and a suspicious domain (linuxwork.net). Although no specific CVEs or known exploits in the wild are cited, the campaign's medium severity rating reflects the ongoing risk posed by unpatched or misconfigured Windows web servers exposed to the internet. The report provides valuable statistical insights into attack frequency and affected systems, underscoring the persistent threat landscape for Windows web servers in 2025.
Potential Impact
For European organizations, this threat poses significant risks due to the widespread use of Windows-based web servers in enterprise environments, government agencies, and critical infrastructure sectors. Successful exploitation can lead to unauthorized remote code execution, enabling attackers to deploy web shells that facilitate persistent access, data exfiltration, lateral movement, and potential disruption of web services. Compromised web servers may serve as pivot points for broader network intrusions, impacting confidentiality, integrity, and availability of sensitive data and services. Given the campaign targets poorly managed and unpatched servers, organizations with inadequate patch management or weak security configurations are particularly vulnerable. The presence of multiple threat actors targeting the same servers simultaneously increases the likelihood of rapid compromise and complicates incident response efforts. Additionally, exploitation of web application frameworks and servers like IIS and Apache Tomcat, which are widely deployed across Europe, amplifies the potential attack surface. This threat could disrupt business operations, damage reputations, and lead to regulatory consequences under GDPR if personal data is compromised.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to this threat landscape. First, conduct comprehensive asset inventories to identify all Windows-based web servers and associated web application frameworks (e.g., IIS, Apache Tomcat). Prioritize patch management to ensure all systems are updated with the latest security patches, especially those addressing known file upload vulnerabilities and web server flaws. Harden web servers by disabling unnecessary modules and services, enforcing strict file upload controls, and implementing input validation to prevent malicious payloads. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block web shell uploads and suspicious command execution patterns. Monitor logs and network traffic for indicators of compromise, including the provided file hashes and suspicious domains like linuxwork.net. Employ endpoint detection and response (EDR) solutions to detect anomalous behaviors linked to remote code execution and lateral movement. Regularly conduct penetration testing and vulnerability assessments focusing on web server configurations and application security. Establish incident response plans that include rapid containment and remediation procedures for web shell infections. Finally, provide security awareness training to IT staff on emerging web server threats and secure configuration best practices.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://asec.ahnlab.com/en/88925"]
- Adversary
- null
- Pulse Id
- 68962f0cc24e24c3ada6d33b
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash06ebef1f7cc6fb21f8266f8c9f9ae2d9 | — | |
hash3f6211234c0889142414f7b579d43c38 | — | |
hash460953e5f7d1e490207d37f95c4f430a | — | |
hash4c8ccdc6f1838489ed2ebeb4978220cb | — | |
hash5c835258fc39104f198bca243e730d57 | — | |
hash6014b987ce6a1cae02eabf799ef387822c781fd2 | — | |
hash818c736a8491de2ea6361ba938268425193b07b7 | — | |
hasha646c67e87109c9fd71a0bafbaa9b954148e144b | — | |
hash37bf9a1d95df82ca50d7467c7c456dc7ed7970bb55710a2bcb084d6db957186f | — | |
hash7be293f546c1a6f503bec6c57aa256a01c4bf91504f6f1205e3a0df7b7e90ac4 | — | |
hash975433abc7777a82287620aa9858a367a8300086290a6b89635e8694778821ec | — |
Domain
Value | Description | Copy |
---|---|---|
domainlinuxwork.net | — |
Threat ID: 689665faad5a09ad0006b467
Added to database: 8/8/2025, 9:02:50 PM
Last enriched: 8/8/2025, 9:18:05 PM
Last updated: 8/10/2025, 6:44:48 AM
Views: 10
Related Threats
Phishing Attack: Deploying Malware on Indian Defense BOSS Linux
MediumExposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open
Medium650 Attack Tools, One Coordinated Campaign
MediumStatistics Report on Malware Targeting Windows Database Servers in Q2 2025
MediumUnmasking SocGholish: The Malware Web Behind the 'Pioneer of Fake Updates' and Its Operator, TA569
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.