News

Microsoft Outlook Web App Vulnerable to Password Hacking via “Backdoor”

Typical Microsoft, the tech giant has more backdoors than Disneyland and World put together; the latest vulnerability that has been unearthed by researchers is a pretty serious breach and allows an attacker the option to steal e-mail authentication credentials from major organizations.

So what is it this time? The Microsoft Outlook Web Application or OWA in question is an Internet-facing webmail server that is being deployed within private companies and organisations, this then offers the ability to provide internal emailing capabilities. Research and subsequent analyses undertaken by security firm “Cybereason” has discovered a backdoor of sorts in the form of a suspicious DLL file. This file was found to be loaded into the companies OWA server with the aim of siphoning decrypted HTTPS requests.

The clever part of this attack is the innocuous nature of deployment in the form of the file name that was the same as another legitimate file; the only difference was the attack file was unsigned and loaded from another directory. According to Cybereason, the attacker (whoever it might be, mentioning no names) replaced the OWAAUTH.dll file that is used by OWA as part of the authentication mechanism with one that contained a dangerous backdoor.

Thus, this allowed attackers to harvest log in information in plain decrypted text, even more worrying is the discovery of more than “11,000 username and password combinations in a log.txt file in the server’s “C:\” partition. The Log.txt file is believed to have been used by attackers to store all logged data”.

The attackers ensured the backdoor could not be removed by creating an IIS (Microsoft Web Filter) that loaded the malicious OWAAUTH.dll file every time the server was restarted.

Indeed, yep, same old same old then, breaches of passwords is worryingly common in the digital age, there needs to be a radical re think of security infrastructure. I do feel companies are using tech as a cheaper alternative without investing in system protection or even real-time analyses, servers and communication lines are being ignored to the point whereby attackers have free reign over such systems. I wonder as I write this as to what else is being siphoned to individuals and attackers, if I see next the formula for Coke in China own brand cola, then it will make sense.

Thank you cybereason for providing us with this information.

Image courtesy of thehackernews

Christopher Files

Disqus Comments Loading...

Recent Posts

Fortnite Main Battle Royal Mode Was Thought up in the Back of an Uber

No matter who you are or where you are it's pretty sure thing that you've…

13 hours ago

Philips Evnia 42″ 3840×2160 OLED 138Hz 0.1ms A-Sync HDR Widescreen Gaming Monitor

Low input lag reduces time delay between devices to monitor SmartImage game mode optimised for…

14 hours ago

Alphacool Apex Stealth Metal fan 2000rpm Matte Black

High-quality, elegant as well as timeless design and technical innovation - these are the features…

14 hours ago

NZXT T120 RGB Performance 120mm CPU Cooler

Aluminum heat pipe cover discreetly hides copper piping 4 conductive copper heat pipes with Direct…

14 hours ago

ASUS ROG Ryujin III 240 ARGB Performance AIO CPU Liquid Cooler

The customizable ARGB fans snap together with a magnetic connector that links the fans and…

14 hours ago

Varmilo VEA88 CMYK Gaming Keyboard, MX-Red, White-LED

TKL mechanical keyboard with 88 keys in a UK ISO layout V-silk PBT keycaps with…

14 hours ago