Categories: Cyber Security News

Hackers Exploit Exposed ASP.NET Machine Keys to Inject Malicious Modules into IIS

Hackers are actively exploiting exposed ASP.NET machine keys to inject a sophisticated malicious module dubbed “HijackServer” into Internet Information Services (IIS), putting hundreds of web servers worldwide at risk of persistent compromise and remote code execution.

The rapidly expanding threat leverages long-known, but too often overlooked, configuration issues in Microsoft’s .NET framework to stage powerful attacks against organizations of all sizes.​

Attackers begin by identifying ASP.NET applications with publicly disclosed or weak machine keys, secrets required to validate and decrypt viewstate data.

By either scraping these keys from abandoned code repositories and programming forums or exfiltrating them from platforms like SharePoint, hackers can manipulate ASP.NET viewstate, leading directly to arbitrary code execution on the underlying server.

Microsoft had warned in early 2025 that over 3,000 machine keys were already exposed, significantly increasing the pool of easy targets.​

Once access is gained, threat actors use privilege-escalation techniques, such as EfsPotato and DeadPotato, to gain administrator-level control. The infection chain proceeds with the deployment of a remote access tool and, ultimately, the HijackServer IIS module.

File upload form from the iis hijackserver module

To evade detection, attackers execute noisy but effective log-clearing and use a rootkit signed with a repurposed, expired code-signing certificate. This rootkit hinders forensic analysis by hiding files, registry keys, and processes related to the intrusion.​

Malicious Module Delivers Persistent Backdoor

HijackServer is engineered as a native IIS module (written in C and .NET), hooking into all HTTP request stages.

It functions both as a search engine optimization (SEO) scam tool that generates fake investment pages visible only to Googlebot and as a fully unauthenticated backdoor.

The module provides attackers with a stealthy, robust channel for remote command execution and file uploads, bypassing traditional authentication methods. Operators control the implant via crafted HTTP headers, further obfuscating their presence.

Location of the ip addresses of the compromised servers we identified. The location is provided by public databases as of september 2025

Config files and HTML templates for HijackServer are fetched from attacker-controlled staging domains, mainly registered with providers in Hong Kong and shielded by Cloudflare.

The infection kit includes automated scripts and a Chinese-language graphical deployment tool, suggesting the campaign has broad, potentially commoditized distribution among threat actors.

Researchers have now identified HijackServer variants for Apache (delivered via PHP) and .NET platforms, extending risk to a broader array of web servers.

The scope of compromise is significant: as of September 2025, at least 171 distinct IIS server instances had the backdoor installed, affecting hundreds of domains globally, from online shops to government portals.

Administrators are urgently advised to rotate all ASP.NET machine keys and scrutinize their IIS environments for suspicious modules or rootkit artifacts, as even patched vulnerabilities leave organizations exposed if secrets have been leaked.​

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post Hackers Exploit Exposed ASP.NET Machine Keys to Inject Malicious Modules into IIS appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Trump administration positions Tennessee, Memphis Safe Task Force as models for national strategy

Gov. Bill Lee greets President Donald Trump during Trump's March 23, 2026 visit to Memphis…

23 minutes ago

Get the LADPED LP80 Adult Electric Scooter With 18-Mile Range and 19mph Top Speed for Just $123

There are many reasons why an electric scooter might be a better fit for you…

2 hours ago

Moana Live-Action Reimagining Official Trailer Reveals First Look at Dwayne ‘The Rock’ Johnson’s Maui, Tamatoa, and Te Kā

Disney has revealed the official trailer for its live-action reimagining of Moana, and it features…

2 hours ago

Magic: The Gathering’s Next Set is Getting a Special Tie-in Novel, and It’s Already Discounted at Amazon

Magic: The Gathering’s Teenage Mutant Ninja Turtle set feels like it just came out (because,…

2 hours ago

Your Big Country headlines: Airport, schools & local changes

BIG COUNTRY, Texas (KTAB/KRBC) - Digital Anchor Brittany Pelletz provides an early update on some…

2 hours ago

From Abilene Roots to Refuge Ranch: Jason Groves on Purpose, Perseverance, and Community

Jason Groves, Senior Vice President and Marketing Director for Clear Fork Bank, shares his personal…

2 hours ago

This website uses cookies.